Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-3596 (GCVE-0-2024-3596)
Vulnerability from cvelistv5
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "rfc",
"vendor": "ietf",
"versions": [
{
"status": "affected",
"version": "2865"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-3596",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-11T03:55:37.141738Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-04T21:05:25.373Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T17:20:52.225Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240822-0001/"
},
{
"url": "https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol"
},
{
"tags": [
"x_transferred"
],
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"tags": [
"x_transferred"
],
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"tags": [
"x_transferred"
],
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.blastradius.fail/"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/4"
},
{
"tags": [
"x_transferred"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RFC",
"vendor": "IETF",
"versions": [
{
"status": "affected",
"version": "2865"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Thanks to Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl who researched and reported this vulnerability"
}
],
"descriptions": [
{
"lang": "en",
"value": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-328: Use of Weak Hash",
"lang": "en"
}
]
},
{
"descriptions": [
{
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en"
}
]
},
{
"descriptions": [
{
"description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-03T17:29:16.788Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"url": "https://www.blastradius.fail/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/4"
},
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"name": "Siemens Security Advisory by Siemens ProductCERT for SIPROTEC, SICAM and related product",
"tags": [
"vendor-advisory"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"name": "Siemens Security Advisory by Siemens ProductCERT to SCALANCE, RUGGEDCOM and related products.",
"tags": [
"vendor-advisory"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.",
"x_generator": {
"engine": "VINCE 3.0.4",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-3596"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-3596",
"datePublished": "2024-07-09T12:02:53.001Z",
"dateReserved": "2024-04-10T15:09:45.391Z",
"dateUpdated": "2025-11-04T17:20:52.225Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-3596\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2024-07-09T12:15:20.700\",\"lastModified\":\"2025-11-04T18:16:31.367\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\"},{\"lang\":\"es\",\"value\":\"El protocolo RADIUS seg\u00fan RFC 2865 es susceptible a ataques de falsificaci\u00f3n por parte de un atacante local que puede modificar cualquier respuesta v\u00e1lida (acceso-aceptaci\u00f3n, acceso-rechazo o acceso-desaf\u00edo) a cualquier otra respuesta utilizando un ataque de colisi\u00f3n de prefijo elegido contra la firma del autenticador de respuesta MD5. .\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-354\"},{\"lang\":\"en\",\"value\":\"CWE-924\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0.27\",\"matchCriteriaId\":\"1C73FF4C-13DE-4050-BD56-447F9382AA4D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B1EDA5-F189-440D-AD0E-C70DD2C0FEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046FB51E-B768-44D3-AEB5-D857145CA840\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF61DAA-8295-4407-B125-1714E1565965\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/09/4\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-723487.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-794185.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/\",\"source\":\"cret@cert.org\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://datatracker.ietf.org/doc/html/rfc2865\",\"source\":\"cret@cert.org\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.blastradius.fail/\",\"source\":\"cret@cert.org\",\"tags\":[\"Technical Description\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/09/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://datatracker.ietf.org/doc/html/rfc2865\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240822-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.blastradius.fail/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/456537\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20240822-0001/\"}, {\"url\": \"https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol\"}, {\"url\": \"https://datatracker.ietf.org/doc/html/rfc2865\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.blastradius.fail/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/07/09/4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/456537\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T17:20:52.225Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3596\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-11T03:55:37.141738Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*\"], \"vendor\": \"ietf\", \"product\": \"rfc\", \"versions\": [{\"status\": \"affected\", \"version\": \"2865\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-24T20:18:02.244Z\"}}], \"cna\": {\"title\": \"RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Thanks to Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl who researched and reported this vulnerability\"}], \"affected\": [{\"vendor\": \"IETF\", \"product\": \"RFC\", \"versions\": [{\"status\": \"affected\", \"version\": \"2865\"}]}], \"references\": [{\"url\": \"https://datatracker.ietf.org/doc/html/rfc2865\"}, {\"url\": \"https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/\"}, {\"url\": \"https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf\"}, {\"url\": \"https://www.blastradius.fail/\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/07/09/4\"}, {\"url\": \"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014\"}, {\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-794185.html\", \"name\": \"Siemens Security Advisory by Siemens ProductCERT for SIPROTEC, SICAM and related product\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-723487.html\", \"name\": \"Siemens Security Advisory by Siemens ProductCERT to SCALANCE, RUGGEDCOM and related products.\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 3.0.4\", \"origin\": \"https://cveawg.mitre.org/api/cve/CVE-2024-3596\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-328: Use of Weak Hash\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel\"}]}], \"providerMetadata\": {\"orgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"shortName\": \"certcc\", \"dateUpdated\": \"2025-09-03T17:29:16.788Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-3596\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T17:20:52.225Z\", \"dateReserved\": \"2024-04-10T15:09:45.391Z\", \"assignerOrgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"datePublished\": \"2024-07-09T12:02:53.001Z\", \"assignerShortName\": \"certcc\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
ncsc-2025-0160
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Apogee, BacNet ATEC, Desigo CC, Intralog, OZW, Polarion, RUGGEDCOM, SICAM, SIMATIC, SIPROTEC, SIRIUS, Teamcenter en Versicharge",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Missing Immutable Root of Trust in Hardware",
"title": "CWE-1326"
},
{
"category": "general",
"text": "Unprotected Alternate Channel",
"title": "CWE-420"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Storing Passwords in a Recoverable Format",
"title": "CWE-257"
},
{
"category": "general",
"text": "Initialization of a Resource with an Insecure Default",
"title": "CWE-1188"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-047424.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-162255.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222768.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-339086.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-523418.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-542540.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556937.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-614723.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-668154.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-718393.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794185.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-828116.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-864900.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-901508.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-05-14T07:13:32.957900Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0160",
"initial_release_date": "2025-05-14T07:13:32.957900Z",
"revision_history": [
{
"date": "2025-05-14T07:13:32.957900Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460317"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460318"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460319"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460320"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460321"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460322"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460323"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460324"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460325"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460326"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460327"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460328"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460329"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460330"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460331"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460332"
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460333"
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460334"
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460335"
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460336"
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460337"
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460338"
}
}
],
"category": "product_name",
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619624"
}
}
],
"category": "product_name",
"name": "SCALANCE XB-200 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1211068"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619666"
}
}
],
"category": "product_name",
"name": "Scalance M-800 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/4.1.8",
"product": {
"name": "vers:siemens/4.1.8",
"product_id": "CSAFPID-1242820"
}
}
],
"category": "product_name",
"name": "Scalance X-300 Firmware (Application)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1303742"
}
}
],
"category": "product_name",
"name": "Scalance XC-200 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1537996"
}
}
],
"category": "product_name",
"name": "Scalance Xch328 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1242876"
}
}
],
"category": "product_name",
"name": "Scalance Xrh334 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1537997"
}
}
],
"category": "product_name",
"name": "Scalance Xrm334 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/4.0.700",
"product": {
"name": "vers:siemens/4.0.700",
"product_id": "CSAFPID-2692750"
}
}
],
"category": "product_name",
"name": "Sidis Prime"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/2022 r1",
"product": {
"name": "vers:unknown/2022 r1",
"product_id": "CSAFPID-1330012"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2022 r2",
"product": {
"name": "vers:unknown/2022 r2",
"product_id": "CSAFPID-1330013"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2022 r3",
"product": {
"name": "vers:unknown/2022 r3",
"product_id": "CSAFPID-1330004"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2023 r1",
"product": {
"name": "vers:unknown/2023 r1",
"product_id": "CSAFPID-1330014"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2023 r2",
"product": {
"name": "vers:unknown/2023 r2",
"product_id": "CSAFPID-1330039"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2023 r3",
"product": {
"name": "vers:unknown/2023 r3",
"product_id": "CSAFPID-1330019"
}
}
],
"category": "product_name",
"name": "Siveillance Video"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/14.2.0.12",
"product": {
"name": "vers:siemens/14.2.0.12",
"product_id": "CSAFPID-1330025"
}
},
{
"category": "product_version_range",
"name": "vers:siemens/14.3.0.10",
"product": {
"name": "vers:siemens/14.3.0.10",
"product_id": "CSAFPID-1330022"
}
},
{
"category": "product_version_range",
"name": "vers:siemens/2312.0005",
"product": {
"name": "vers:siemens/2312.0005",
"product_id": "CSAFPID-1330018"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619667"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom I800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619615"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619655"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom M2200Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619634"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rmc30Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293566"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rox Mx5000Re"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619654"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs1600Tnc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619641"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619623"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs400Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619650"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs401Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619594"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619664"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619618"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs8000Tnc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619590"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619591"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs900Gnc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619635"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rs900Mnc-Stnd-Xx-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619628"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rsg2100Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619647"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rsg908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619661"
}
}
],
"category": "product_name",
"name": "\u200bRuggedcom Rst916P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/4",
"product": {
"name": "vers:siemens/4",
"product_id": "CSAFPID-1330035"
}
}
],
"category": "product_name",
"name": "INTRALOG WMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/2312.0005",
"product": {
"name": "vers:siemens/2312.0005",
"product_id": "CSAFPID-1330038"
}
}
],
"category": "product_name",
"name": "JT2Go (Application)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/7.4.5",
"product": {
"name": "vers:siemens/7.4.5",
"product_id": "CSAFPID-2695632"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1756091"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619633"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW (Application)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619629"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619656"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619619"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293729"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293791"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293823"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293916"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619622"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619609"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619640"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619612"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619593"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619599"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619665"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619636"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619660"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619632"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000HNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619651"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619610"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GPNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619604"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619639"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619621"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619601"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619596"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619627"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619638"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619586"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619658"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619589"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619607"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619606"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619611"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619630"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619587"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619657"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619652"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1242823"
}
}
],
"category": "product_name",
"name": "RuggedCom ROX II Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619662"
}
}
],
"category": "product_name",
"name": "Ruggedcom I800Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619592"
}
}
],
"category": "product_name",
"name": "Ruggedcom I801Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619644"
}
}
],
"category": "product_name",
"name": "Ruggedcom M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619648"
}
}
],
"category": "product_name",
"name": "Ruggedcom M969Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619645"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rmc30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293822"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rox Mx5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293767"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rox Rx1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293686"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rox Rx1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1293714"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rox Rx1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619608"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs1600Fnc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619614"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619616"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619598"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs8000Anc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619613"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs8000Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619603"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619595"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900Gp"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619663"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900M-Gets-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619602"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900M-Gets-Xx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619620"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900M-Stnd-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619642"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900M-Stnd-Xx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619625"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900Mnc-Stnd-Xx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619597"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs900Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619653"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619646"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rs940Gnc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619649"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rsg2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619588"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rsg2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619631"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rsg2200Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619659"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rsg909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619643"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rsl910Nc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619626"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rst2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619637"
}
}
],
"category": "product_name",
"name": "Ruggedcom Rst2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619605"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1242803"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619617"
}
}
],
"category": "product_name",
"name": "SCALANCE XF-200BA Firmware (OS)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1242788"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619600"
}
}
],
"category": "product_name",
"name": "SCALANCE XP-200 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1303918"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-300WG Firmware (OS)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/unknown",
"product": {
"name": "vers:unknown/unknown",
"product_id": "CSAFPID-1708519"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 Firmware (OS)"
}
],
"category": "product_family",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271128"
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271129"
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271130"
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271131"
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271132"
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271133"
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271134"
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271135"
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271136"
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271137"
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271138"
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271139"
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271140"
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271141"
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271142"
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271143"
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271144"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271145"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271147"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271146"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271148"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271149"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271150"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271151"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271152"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271153"
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460375"
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271195"
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271196"
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271197"
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271198"
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv22.1 hotfixrev16",
"product": {
"name": "vers:unknown/\u003cv22.1 hotfixrev16",
"product_id": "CSAFPID-1305996"
}
}
],
"category": "product_name",
"name": "Siveillance Video 2022 R1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv22.2 hotfixrev16",
"product": {
"name": "vers:unknown/\u003cv22.2 hotfixrev16",
"product_id": "CSAFPID-1305997"
}
}
],
"category": "product_name",
"name": "Siveillance Video 2022 R2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv22.3 hotfixrev15",
"product": {
"name": "vers:unknown/\u003cv22.3 hotfixrev15",
"product_id": "CSAFPID-1305998"
}
}
],
"category": "product_name",
"name": "Siveillance Video 2022 R3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv23.1 hotfixrev14",
"product": {
"name": "vers:unknown/\u003cv23.1 hotfixrev14",
"product_id": "CSAFPID-1305999"
}
}
],
"category": "product_name",
"name": "Siveillance Video 2023 R1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv23.2 hotfixrev13",
"product": {
"name": "vers:unknown/\u003cv23.2 hotfixrev13",
"product_id": "CSAFPID-1306000"
}
}
],
"category": "product_name",
"name": "Siveillance Video 2023 R2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv23.3 hotfixrev11",
"product": {
"name": "vers:unknown/\u003cv23.3 hotfixrev11",
"product_id": "CSAFPID-1306001"
}
}
],
"category": "product_name",
"name": "Siveillance Video 2023 R3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4",
"product": {
"name": "vers:unknown/\u003cv4",
"product_id": "CSAFPID-1272161"
}
}
],
"category": "product_name",
"name": "INTRALOG WMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1272525"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv5.6",
"product": {
"name": "vers:all/\u003cv5.6",
"product_id": "CSAFPID-1299351"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427252"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427253"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427254"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299123"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299124"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427255"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427256"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271619"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268946"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427257"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V4.X NC products"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271620"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271621"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271622"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271623"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271624"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271625"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271626"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271627"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271628"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271629"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271630"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427258"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427259"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427260"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427261"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427262"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427263"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427264"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270075"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427265"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270078"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427266"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271635"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427267"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271637"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427268"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427269"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427270"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427271"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427272"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427273"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271640"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427274"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427275"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271643"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268953"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427276"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427277"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427278"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427279"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427280"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427281"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268954"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427282"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427283"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427284"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427285"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427286"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427287"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427288"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427289"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427290"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427291"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427292"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427293"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271655"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268956"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427294"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427295"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427296"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271659"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268958"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427297"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271661"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268960"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427298"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271663"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268962"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427299"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271665"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268964"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271666"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271667"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271668"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271669"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427300"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271671"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268970"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271672"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268972"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271673"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271674"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427301"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271675"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271676"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427248"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427249"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427250"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.3.11",
"product": {
"name": "vers:all/\u003cv4.3.11",
"product_id": "CSAFPID-1427251"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299125"
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299126"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299127"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299128"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299129"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299130"
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299131"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299132"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299133"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299134"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299135"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299136"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299137"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299138"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299139"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299140"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299141"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299142"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299143"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299144"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299145"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299146"
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299147"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv8.2",
"product": {
"name": "vers:all/\u003cv8.2",
"product_id": "CSAFPID-1299148"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270544"
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270545"
}
}
],
"category": "product_name",
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270546"
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270547"
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270548"
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1270549"
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268733"
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268734"
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268735"
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268736"
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268737"
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268738"
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268739"
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268740"
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268741"
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268742"
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268743"
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268744"
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268745"
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268746"
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268747"
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268748"
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268749"
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268750"
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268751"
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268752"
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268753"
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268754"
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268755"
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268756"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268757"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268758"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268759"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268760"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268761"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268762"
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268763"
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268764"
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268765"
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268766"
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268767"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268768"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268769"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268770"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268771"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268772"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268773"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268774"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268775"
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268776"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268777"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268778"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268779"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268780"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268781"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268782"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268783"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268784"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268785"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268786"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1268787"
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767378"
}
}
],
"category": "product_name",
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767379"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767380"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767381"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767382"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767383"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767384"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767385"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767386"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767387"
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767388"
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767389"
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767390"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767391"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767392"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767393"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767394"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767395"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv3.0.0",
"product": {
"name": "vers:all/\u003cv3.0.0",
"product_id": "CSAFPID-1767396"
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460297"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460296"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460299"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460298"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460301"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460300"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460303"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460302"
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460304"
}
}
],
"category": "product_name",
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460305"
}
}
],
"category": "product_name",
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460307"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460306"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460309"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460308"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460311"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460310"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460313"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460312"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460314"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460315"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460316"
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271154"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271155"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271156"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271157"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271158"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271160"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271159"
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271161"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271163"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271162"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271164"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271165"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271166"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271167"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271168"
}
}
],
"category": "product_name",
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271169"
}
}
],
"category": "product_name",
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271170"
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271171"
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271172"
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427302"
}
}
],
"category": "product_name",
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427303"
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427304"
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427305"
}
}
],
"category": "product_name",
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427306"
}
}
],
"category": "product_name",
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427307"
}
}
],
"category": "product_name",
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427308"
}
}
],
"category": "product_name",
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271751"
}
}
],
"category": "product_name",
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271752"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271753"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271754"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271173"
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271174"
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271175"
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271176"
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271755"
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271756"
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271757"
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271758"
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271759"
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271760"
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271177"
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271178"
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271179"
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271180"
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271181"
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271182"
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271183"
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271184"
}
}
],
"category": "product_name",
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427309"
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427310"
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427311"
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427312"
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427313"
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427314"
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460339"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460340"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460341"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460342"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460343"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460344"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460345"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460346"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460347"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460348"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460349"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460350"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460351"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460352"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460353"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460354"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460355"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460356"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460357"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460358"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460359"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460360"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460361"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460362"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460363"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460364"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460365"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460366"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460367"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460368"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460369"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460370"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460371"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460372"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460373"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.1.9",
"product": {
"name": "vers:all/\u003cv4.1.9",
"product_id": "CSAFPID-2460374"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271186"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271185"
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271187"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271188"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427315"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427316"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427317"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427318"
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271189"
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271190"
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271191"
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271192"
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271193"
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271194"
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427319"
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427320"
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427321"
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427322"
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427323"
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427324"
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271797"
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271798"
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271799"
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271800"
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271801"
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271802"
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427325"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427326"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1427327"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271803"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271804"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271805"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271806"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271807"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271808"
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271811"
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271810"
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271809"
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271812"
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271815"
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271816"
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271814"
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271813"
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271817"
}
}
],
"category": "product_name",
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271818"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271819"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271820"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271821"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271822"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1271823"
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cv4.0.700",
"product": {
"name": "vers:all/\u003cv4.0.700",
"product_id": "CSAFPID-2632571"
}
}
],
"category": "product_name",
"name": "SIDIS Prime"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "vers:all/*",
"product_id": "CSAFPID-1299352"
}
}
],
"category": "product_name",
"name": "SINEC INS"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-31930",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "other",
"text": "Initialization of a Resource with an Insecure Default",
"title": "CWE-1188"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31930",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31930.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-31930"
},
{
"cve": "CVE-2025-32454",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-32454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-32454"
},
{
"cve": "CVE-2025-40555",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-40555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-40555"
},
{
"cve": "CVE-2025-40556",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40556",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-40556.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-40556"
},
{
"cve": "CVE-2025-40566",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40566",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-40566.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-40566"
},
{
"cve": "CVE-2024-0056",
"cwe": {
"id": "CWE-420",
"name": "Unprotected Alternate Channel"
},
"notes": [
{
"category": "other",
"text": "Unprotected Alternate Channel",
"title": "CWE-420"
},
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-0056"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/AU:N/R:A/V:C/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-20672",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-20672"
},
{
"cve": "CVE-2024-23815",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23815",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23815.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-23815"
},
{
"cve": "CVE-2024-30105",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-30105"
},
{
"cve": "CVE-2024-32122",
"cwe": {
"id": "CWE-257",
"name": "Storing Passwords in a Recoverable Format"
},
"notes": [
{
"category": "other",
"text": "Storing Passwords in a Recoverable Format",
"title": "CWE-257"
},
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-32122"
},
{
"cve": "CVE-2024-35264",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-35264"
},
{
"cve": "CVE-2024-38081",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38081",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38081.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-38081"
},
{
"cve": "CVE-2024-38095",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38095",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38095.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-38095"
},
{
"cve": "CVE-2024-43483",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43483",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43483.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-43483"
},
{
"cve": "CVE-2024-43485",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43485",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43485.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-43485"
},
{
"cve": "CVE-2024-51444",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51444",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-51444.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-51444"
},
{
"cve": "CVE-2024-51445",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51445",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-51445.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-51445"
},
{
"cve": "CVE-2024-51446",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-51446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-51446"
},
{
"cve": "CVE-2024-51447",
"cwe": {
"id": "CWE-204",
"name": "Observable Response Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51447",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-51447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2024-51447"
},
{
"cve": "CVE-2024-52963",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52963",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52963.json"
}
],
"title": "CVE-2024-52963"
},
{
"cve": "CVE-2025-24007",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24007",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24007.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-24007"
},
{
"cve": "CVE-2025-24008",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24008",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24008.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-24008"
},
{
"cve": "CVE-2025-24009",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24009",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24009.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-24009"
},
{
"cve": "CVE-2025-24510",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24510",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24510.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-24510"
},
{
"cve": "CVE-2025-26389",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26389",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26389.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-26389"
},
{
"cve": "CVE-2025-26390",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26390",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-26390"
},
{
"cve": "CVE-2025-30174",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30174",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30174.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-30174"
},
{
"cve": "CVE-2025-30175",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30175",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30175.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-30175"
},
{
"cve": "CVE-2025-30176",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
}
],
"title": "CVE-2025-30176"
},
{
"cve": "CVE-2025-31929",
"cwe": {
"id": "CWE-1326",
"name": "Missing Immutable Root of Trust in Hardware"
},
"notes": [
{
"category": "other",
"text": "Missing Immutable Root of Trust in Hardware",
"title": "CWE-1326"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2460317",
"CSAFPID-2460318",
"CSAFPID-2460319",
"CSAFPID-2460320",
"CSAFPID-2460321",
"CSAFPID-2460322",
"CSAFPID-2460323",
"CSAFPID-2460324",
"CSAFPID-2460325",
"CSAFPID-2460326",
"CSAFPID-2460327",
"CSAFPID-2460328",
"CSAFPID-2460329",
"CSAFPID-2460330",
"CSAFPID-2460331",
"CSAFPID-2460332",
"CSAFPID-2460333",
"CSAFPID-2460334",
"CSAFPID-2460335",
"CSAFPID-2460336",
"CSAFPID-2460337",
"CSAFPID-2460338",
"CSAFPID-2619624",
"CSAFPID-1271128",
"CSAFPID-1271129",
"CSAFPID-1271130",
"CSAFPID-1271131",
"CSAFPID-1271132",
"CSAFPID-1271133",
"CSAFPID-1271134",
"CSAFPID-1271135",
"CSAFPID-1271136",
"CSAFPID-1271137",
"CSAFPID-1271138",
"CSAFPID-1271139",
"CSAFPID-1271140",
"CSAFPID-1271141",
"CSAFPID-1271142",
"CSAFPID-1271143",
"CSAFPID-1271144",
"CSAFPID-1271145",
"CSAFPID-1271147",
"CSAFPID-1271146",
"CSAFPID-1271148",
"CSAFPID-1271149",
"CSAFPID-1271150",
"CSAFPID-1271151",
"CSAFPID-1271152",
"CSAFPID-1271153",
"CSAFPID-1211068",
"CSAFPID-2460375",
"CSAFPID-1271195",
"CSAFPID-1271196",
"CSAFPID-1271197",
"CSAFPID-1271198",
"CSAFPID-2619666",
"CSAFPID-1242820",
"CSAFPID-1303742",
"CSAFPID-1537996",
"CSAFPID-1242876",
"CSAFPID-1537997",
"CSAFPID-2692750",
"CSAFPID-1330012",
"CSAFPID-1330013",
"CSAFPID-1330004",
"CSAFPID-1330014",
"CSAFPID-1330039",
"CSAFPID-1330019",
"CSAFPID-1305996",
"CSAFPID-1305997",
"CSAFPID-1305998",
"CSAFPID-1305999",
"CSAFPID-1306000",
"CSAFPID-1306001",
"CSAFPID-1330025",
"CSAFPID-1330022",
"CSAFPID-1330018",
"CSAFPID-2619667",
"CSAFPID-2619615",
"CSAFPID-2619655",
"CSAFPID-2619634",
"CSAFPID-1293566",
"CSAFPID-2619654",
"CSAFPID-2619641",
"CSAFPID-2619623",
"CSAFPID-2619650",
"CSAFPID-2619594",
"CSAFPID-2619664",
"CSAFPID-2619618",
"CSAFPID-2619590",
"CSAFPID-2619591",
"CSAFPID-2619635",
"CSAFPID-2619628",
"CSAFPID-2619647",
"CSAFPID-2619661",
"CSAFPID-1330035",
"CSAFPID-1272161",
"CSAFPID-1330038",
"CSAFPID-1272525",
"CSAFPID-2695632",
"CSAFPID-1756091",
"CSAFPID-1299351",
"CSAFPID-2619633",
"CSAFPID-1427252",
"CSAFPID-2619629",
"CSAFPID-1427253",
"CSAFPID-1427254",
"CSAFPID-2619656",
"CSAFPID-1299123",
"CSAFPID-1299124",
"CSAFPID-1427255",
"CSAFPID-1427256",
"CSAFPID-1271619",
"CSAFPID-1268946",
"CSAFPID-2619619",
"CSAFPID-1427257",
"CSAFPID-1271620",
"CSAFPID-1271621",
"CSAFPID-1271622",
"CSAFPID-1293729",
"CSAFPID-1271623",
"CSAFPID-1271624",
"CSAFPID-1271625",
"CSAFPID-1271626",
"CSAFPID-1293791",
"CSAFPID-1271627",
"CSAFPID-1271628",
"CSAFPID-1271629",
"CSAFPID-1293823",
"CSAFPID-1271630",
"CSAFPID-1293916",
"CSAFPID-1427258",
"CSAFPID-2619622",
"CSAFPID-1427259",
"CSAFPID-2619609",
"CSAFPID-1427260",
"CSAFPID-2619640",
"CSAFPID-2619612",
"CSAFPID-1427261",
"CSAFPID-1427262",
"CSAFPID-1427263",
"CSAFPID-2619593",
"CSAFPID-1427264",
"CSAFPID-2619599",
"CSAFPID-1270075",
"CSAFPID-1427265",
"CSAFPID-2619665",
"CSAFPID-1270078",
"CSAFPID-1427266",
"CSAFPID-1271635",
"CSAFPID-1427267",
"CSAFPID-1271637",
"CSAFPID-1427268",
"CSAFPID-2619636",
"CSAFPID-1427269",
"CSAFPID-2619660",
"CSAFPID-1427270",
"CSAFPID-2619632",
"CSAFPID-1427271",
"CSAFPID-1427272",
"CSAFPID-1427273",
"CSAFPID-1271640",
"CSAFPID-1427274",
"CSAFPID-2619651",
"CSAFPID-1427275",
"CSAFPID-1271643",
"CSAFPID-1268953",
"CSAFPID-1427276",
"CSAFPID-2619610",
"CSAFPID-1427277",
"CSAFPID-1427278",
"CSAFPID-1427279",
"CSAFPID-1427280",
"CSAFPID-1427281",
"CSAFPID-2619604",
"CSAFPID-2619639",
"CSAFPID-1268954",
"CSAFPID-1427282",
"CSAFPID-2619621",
"CSAFPID-1427283",
"CSAFPID-2619601",
"CSAFPID-1427284",
"CSAFPID-2619596",
"CSAFPID-1427285",
"CSAFPID-1427286",
"CSAFPID-1427287",
"CSAFPID-1427288",
"CSAFPID-1427289",
"CSAFPID-1427290",
"CSAFPID-2619627",
"CSAFPID-1427291",
"CSAFPID-1427292",
"CSAFPID-1427293",
"CSAFPID-1271655",
"CSAFPID-1268956",
"CSAFPID-1427294",
"CSAFPID-2619638",
"CSAFPID-2619586",
"CSAFPID-1427295",
"CSAFPID-1427296",
"CSAFPID-1271659",
"CSAFPID-1268958",
"CSAFPID-1427297",
"CSAFPID-1271661",
"CSAFPID-1268960",
"CSAFPID-1427298",
"CSAFPID-1271663",
"CSAFPID-1268962",
"CSAFPID-1427299",
"CSAFPID-1271665",
"CSAFPID-1268964",
"CSAFPID-1271666",
"CSAFPID-2619658",
"CSAFPID-1271667",
"CSAFPID-1271668",
"CSAFPID-1271669",
"CSAFPID-2619589",
"CSAFPID-1427300",
"CSAFPID-1271671",
"CSAFPID-1268970",
"CSAFPID-1271672",
"CSAFPID-2619607",
"CSAFPID-1268972",
"CSAFPID-1271673",
"CSAFPID-1271674",
"CSAFPID-1427301",
"CSAFPID-1271675",
"CSAFPID-2619606",
"CSAFPID-1271676",
"CSAFPID-1427248",
"CSAFPID-1427249",
"CSAFPID-2619611",
"CSAFPID-1427250",
"CSAFPID-2619630",
"CSAFPID-2619587",
"CSAFPID-1427251",
"CSAFPID-2619657",
"CSAFPID-2619652",
"CSAFPID-1242823",
"CSAFPID-2619662",
"CSAFPID-2619592",
"CSAFPID-2619644",
"CSAFPID-2619648",
"CSAFPID-2619645",
"CSAFPID-1293822",
"CSAFPID-1293767",
"CSAFPID-1293686",
"CSAFPID-1293714",
"CSAFPID-2619608",
"CSAFPID-2619614",
"CSAFPID-2619616",
"CSAFPID-2619598",
"CSAFPID-2619613",
"CSAFPID-2619603",
"CSAFPID-2619595",
"CSAFPID-2619663",
"CSAFPID-2619602",
"CSAFPID-2619620",
"CSAFPID-2619642",
"CSAFPID-2619625",
"CSAFPID-2619597",
"CSAFPID-2619653",
"CSAFPID-2619646",
"CSAFPID-2619649",
"CSAFPID-2619588",
"CSAFPID-2619631",
"CSAFPID-2619659",
"CSAFPID-2619643",
"CSAFPID-2619626",
"CSAFPID-2619637",
"CSAFPID-1299125",
"CSAFPID-1299126",
"CSAFPID-1299127",
"CSAFPID-1299128",
"CSAFPID-1299129",
"CSAFPID-1299130",
"CSAFPID-1299131",
"CSAFPID-1299132",
"CSAFPID-1299133",
"CSAFPID-1299134",
"CSAFPID-1299135",
"CSAFPID-1299136",
"CSAFPID-1299137",
"CSAFPID-1299138",
"CSAFPID-1299139",
"CSAFPID-1299140",
"CSAFPID-1299141",
"CSAFPID-1299142",
"CSAFPID-1299143",
"CSAFPID-1299144",
"CSAFPID-1299145",
"CSAFPID-1299146",
"CSAFPID-1299147",
"CSAFPID-1299148",
"CSAFPID-2619605",
"CSAFPID-1270544",
"CSAFPID-1270545",
"CSAFPID-1270546",
"CSAFPID-1270547",
"CSAFPID-1270548",
"CSAFPID-1270549",
"CSAFPID-1268733",
"CSAFPID-1268734",
"CSAFPID-1268735",
"CSAFPID-1268736",
"CSAFPID-1268737",
"CSAFPID-1268738",
"CSAFPID-1268739",
"CSAFPID-1268740",
"CSAFPID-1268741",
"CSAFPID-1268742",
"CSAFPID-1268743",
"CSAFPID-1268744",
"CSAFPID-1268745",
"CSAFPID-1268746",
"CSAFPID-1268747",
"CSAFPID-1268748",
"CSAFPID-1268749",
"CSAFPID-1268750",
"CSAFPID-1268751",
"CSAFPID-1268752",
"CSAFPID-1268753",
"CSAFPID-1268754",
"CSAFPID-1268755",
"CSAFPID-1268756",
"CSAFPID-1268757",
"CSAFPID-1268758",
"CSAFPID-1268759",
"CSAFPID-1268760",
"CSAFPID-1268761",
"CSAFPID-1268762",
"CSAFPID-1268763",
"CSAFPID-1268764",
"CSAFPID-1268765",
"CSAFPID-1268766",
"CSAFPID-1268767",
"CSAFPID-1268768",
"CSAFPID-1268769",
"CSAFPID-1268770",
"CSAFPID-1268771",
"CSAFPID-1268772",
"CSAFPID-1268773",
"CSAFPID-1268774",
"CSAFPID-1268775",
"CSAFPID-1268776",
"CSAFPID-1268777",
"CSAFPID-1268778",
"CSAFPID-1268779",
"CSAFPID-1268780",
"CSAFPID-1268781",
"CSAFPID-1268782",
"CSAFPID-1268783",
"CSAFPID-1268784",
"CSAFPID-1268785",
"CSAFPID-1268786",
"CSAFPID-1268787",
"CSAFPID-1767378",
"CSAFPID-1767379",
"CSAFPID-1767380",
"CSAFPID-1767381",
"CSAFPID-1767382",
"CSAFPID-1767383",
"CSAFPID-1767384",
"CSAFPID-1767385",
"CSAFPID-1767386",
"CSAFPID-1767387",
"CSAFPID-1767388",
"CSAFPID-1767389",
"CSAFPID-1767390",
"CSAFPID-1767391",
"CSAFPID-1767392",
"CSAFPID-1767393",
"CSAFPID-1767394",
"CSAFPID-1767395",
"CSAFPID-1767396",
"CSAFPID-2460297",
"CSAFPID-2460296",
"CSAFPID-2460299",
"CSAFPID-2460298",
"CSAFPID-2460301",
"CSAFPID-2460300",
"CSAFPID-2460303",
"CSAFPID-2460302",
"CSAFPID-2460304",
"CSAFPID-2460305",
"CSAFPID-2460307",
"CSAFPID-2460306",
"CSAFPID-2460309",
"CSAFPID-2460308",
"CSAFPID-2460311",
"CSAFPID-2460310",
"CSAFPID-2460313",
"CSAFPID-2460312",
"CSAFPID-2460314",
"CSAFPID-2460315",
"CSAFPID-2460316",
"CSAFPID-1271154",
"CSAFPID-1242803",
"CSAFPID-1271155",
"CSAFPID-1271156",
"CSAFPID-1271157",
"CSAFPID-1271158",
"CSAFPID-1271160",
"CSAFPID-1271159",
"CSAFPID-1271161",
"CSAFPID-1271163",
"CSAFPID-1271162",
"CSAFPID-1271164",
"CSAFPID-1271165",
"CSAFPID-1271166",
"CSAFPID-1271167",
"CSAFPID-1271168",
"CSAFPID-1271169",
"CSAFPID-1271170",
"CSAFPID-1271171",
"CSAFPID-1271172",
"CSAFPID-1427302",
"CSAFPID-1427303",
"CSAFPID-1427304",
"CSAFPID-1427305",
"CSAFPID-1427306",
"CSAFPID-1427307",
"CSAFPID-1427308",
"CSAFPID-1271751",
"CSAFPID-1271752",
"CSAFPID-1271753",
"CSAFPID-1271754",
"CSAFPID-2619617",
"CSAFPID-1271173",
"CSAFPID-1271174",
"CSAFPID-1271175",
"CSAFPID-1271176",
"CSAFPID-1242788",
"CSAFPID-1271755",
"CSAFPID-1271756",
"CSAFPID-1271757",
"CSAFPID-1271758",
"CSAFPID-1271759",
"CSAFPID-1271760",
"CSAFPID-2619600",
"CSAFPID-1271177",
"CSAFPID-1271178",
"CSAFPID-1271179",
"CSAFPID-1271180",
"CSAFPID-1271181",
"CSAFPID-1271182",
"CSAFPID-1271183",
"CSAFPID-1271184",
"CSAFPID-1303918",
"CSAFPID-1708519",
"CSAFPID-1427309",
"CSAFPID-1427310",
"CSAFPID-1427311",
"CSAFPID-1427312",
"CSAFPID-1427313",
"CSAFPID-1427314",
"CSAFPID-2460339",
"CSAFPID-2460340",
"CSAFPID-2460341",
"CSAFPID-2460342",
"CSAFPID-2460343",
"CSAFPID-2460344",
"CSAFPID-2460345",
"CSAFPID-2460346",
"CSAFPID-2460347",
"CSAFPID-2460348",
"CSAFPID-2460349",
"CSAFPID-2460350",
"CSAFPID-2460351",
"CSAFPID-2460352",
"CSAFPID-2460353",
"CSAFPID-2460354",
"CSAFPID-2460355",
"CSAFPID-2460356",
"CSAFPID-2460357",
"CSAFPID-2460358",
"CSAFPID-2460359",
"CSAFPID-2460360",
"CSAFPID-2460361",
"CSAFPID-2460362",
"CSAFPID-2460363",
"CSAFPID-2460364",
"CSAFPID-2460365",
"CSAFPID-2460366",
"CSAFPID-2460367",
"CSAFPID-2460368",
"CSAFPID-2460369",
"CSAFPID-2460370",
"CSAFPID-2460371",
"CSAFPID-2460372",
"CSAFPID-2460373",
"CSAFPID-2460374",
"CSAFPID-1271186",
"CSAFPID-1271185",
"CSAFPID-1271187",
"CSAFPID-1271188",
"CSAFPID-1427315",
"CSAFPID-1427316",
"CSAFPID-1427317",
"CSAFPID-1427318",
"CSAFPID-1271189",
"CSAFPID-1271190",
"CSAFPID-1271191",
"CSAFPID-1271192",
"CSAFPID-1271193",
"CSAFPID-1271194",
"CSAFPID-1427319",
"CSAFPID-1427320",
"CSAFPID-1427321",
"CSAFPID-1427322",
"CSAFPID-1427323",
"CSAFPID-1427324",
"CSAFPID-1271797",
"CSAFPID-1271798",
"CSAFPID-1271799",
"CSAFPID-1271800",
"CSAFPID-1271801",
"CSAFPID-1271802",
"CSAFPID-1427325",
"CSAFPID-1427326",
"CSAFPID-1427327",
"CSAFPID-1271803",
"CSAFPID-1271804",
"CSAFPID-1271805",
"CSAFPID-1271806",
"CSAFPID-1271807",
"CSAFPID-1271808",
"CSAFPID-1271811",
"CSAFPID-1271810",
"CSAFPID-1271809",
"CSAFPID-1271812",
"CSAFPID-1271815",
"CSAFPID-1271816",
"CSAFPID-1271814",
"CSAFPID-1271813",
"CSAFPID-1271817",
"CSAFPID-1271818",
"CSAFPID-1271819",
"CSAFPID-1271820",
"CSAFPID-1271821",
"CSAFPID-1271822",
"CSAFPID-1271823",
"CSAFPID-2632571",
"CSAFPID-1299352"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31929",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31929.json"
}
],
"title": "CVE-2025-31929"
}
]
}
ncsc-2024-0279
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-07-09T18:40:21.043319Z",
"id": "NCSC-2024-0279",
"initial_release_date": "2024-07-09T18:40:21.043319Z",
"revision_history": [
{
"date": "2024-07-09T18:40:21.043319Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "rfc",
"product": {
"name": "rfc",
"product_id": "CSAFPID-1497114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "ietf"
},
{
"branches": [
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"references": [
{
"category": "self",
"summary": "CVE-2024-21417",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json"
}
],
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-28899",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28899",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30081",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30081",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30098",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35270",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-37969",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37969",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37974",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37981",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json"
}
],
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37986",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37986",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37987",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-38013",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38022",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38022",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38034",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38034",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38041",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json"
}
],
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json"
}
],
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38517",
"references": [
{
"category": "self",
"summary": "CVE-2024-38517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json"
}
],
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-38051",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38051",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38054",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38054",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38060",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json"
}
],
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38085",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"cwe": {
"id": "CWE-166",
"name": "Improper Handling of Missing Special Element"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38091",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38102",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-30013",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-30013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json"
}
],
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497114"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1497114"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37971",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json"
}
],
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37972",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json"
}
],
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37973",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37975",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json"
}
],
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37984",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37984",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json"
}
],
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37988",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37988",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json"
}
],
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38010",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38011",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38017",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json"
}
],
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json"
}
],
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38027",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38027",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38028",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json"
}
],
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38033",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json"
}
],
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38047",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38047",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json"
}
],
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38048",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json"
}
],
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38050",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json"
}
],
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38052",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38052",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json"
}
],
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38057",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38057",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38065",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38065",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json"
}
],
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38068",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json"
}
],
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38069",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38070",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json"
}
],
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38079",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json"
}
],
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38101",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38101",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json"
}
],
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38105",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-39684",
"references": [
{
"category": "self",
"summary": "CVE-2024-39684",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json"
}
],
"title": "CVE-2024-39684"
},
{
"cve": "CVE-2024-38015",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38015",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json"
}
],
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json"
}
],
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json"
}
],
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38077",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json"
}
],
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38100",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json"
}
],
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38031",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json"
}
],
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38044",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json"
}
],
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38067",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38067",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json"
}
],
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38073",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json"
}
],
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json"
}
],
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38076",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json"
}
],
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38099",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38099",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json"
}
],
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38059",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38059",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json"
}
],
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38080",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json"
}
],
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-26184",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json"
}
],
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-37977",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37977",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json"
}
],
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-38032",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json"
}
],
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38078",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38078",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json"
}
],
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-37985",
"references": [
{
"category": "self",
"summary": "CVE-2024-37985",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json"
}
],
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37978",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37978",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json"
}
],
"title": "CVE-2024-37978"
}
]
}
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-01-22T13:30:50.189632Z",
"id": "NCSC-2025-0021",
"initial_release_date": "2025-01-22T13:30:50.189632Z",
"revision_history": [
{
"date": "2025-01-22T13:30:50.189632Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1727475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1751303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1751300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1751253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1751090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1751246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1751231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1751241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1751243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-1751218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-916906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41727",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
}
],
"title": "CVE-2022-41727"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
}
],
"title": "CVE-2023-5981"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2023-29407",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29407",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2023-29407"
},
{
"cve": "CVE-2023-29408",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2023-40577",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-40577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46604",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46604",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
}
],
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650777",
"CSAFPID-1650778",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7885",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27309",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-47803",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47803"
},
{
"cve": "CVE-2024-47804",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49766",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21542",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21554"
}
]
}
ncsc-2024-0282
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDOM, SIMATIC, SINEMA, SIPROTEC en de Engineering Platforms voor diverse systemen.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Privilege Defined With Unsafe Actions",
"title": "CWE-267"
},
{
"category": "general",
"text": "Incorrect User Management",
"title": "CWE-286"
},
{
"category": "general",
"text": "Improper Restriction of Excessive Authentication Attempts",
"title": "CWE-307"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Creation of Temporary File With Insecure Permissions",
"title": "CWE-378"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere",
"title": "CWE-497"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Use of Hard-coded, Security-relevant Constants",
"title": "CWE-547"
},
{
"category": "general",
"text": "Client-Side Enforcement of Server-Side Security",
"title": "CWE-602"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Use of Password Hash With Insufficient Computational Effort",
"title": "CWE-916"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064222.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-088132.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170375.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-313039.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-364175.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-381581.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-698820.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-722010.pdf"
},
{
"category": "external",
"summary": "Reference - siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723487.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-750499.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779936.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824889.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-868282.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-883918.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-928781.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-998949.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens Producten",
"tracking": {
"current_release_date": "2024-07-09T18:40:57.534939Z",
"id": "NCSC-2024-0282",
"initial_release_date": "2024-07-09T18:40:57.534939Z",
"revision_history": [
{
"date": "2024-07-09T18:40:57.534939Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "jt_open",
"product": {
"name": "jt_open",
"product_id": "CSAFPID-1497083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt_open:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_encryption",
"product": {
"name": "mendix_encryption",
"product_id": "CSAFPID-1497113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_encryption:v10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "plm_xml_sdk",
"product": {
"name": "plm_xml_sdk",
"product_id": "CSAFPID-1497084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:plm_xml_sdk:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ps_iges_parasolid_translator_component",
"product": {
"name": "ps_iges_parasolid_translator_component",
"product_id": "CSAFPID-1464909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ps_iges_parasolid_translator_component:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1496944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497428",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1498045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800nc",
"product": {
"name": "ruggedcom_i800nc",
"product_id": "CSAFPID-1496945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800nc",
"product": {
"name": "ruggedcom_i800nc",
"product_id": "CSAFPID-1497536",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:4.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1498050",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1498073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32260",
"cwe": {
"id": "CWE-286",
"name": "Incorrect User Management"
},
"notes": [
{
"category": "other",
"text": "Incorrect User Management",
"title": "CWE-286"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-32260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-32260.json"
}
],
"title": "CVE-2022-32260"
},
{
"cve": "CVE-2023-7066",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-7066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7066.json"
}
],
"title": "CVE-2023-7066"
},
{
"cve": "CVE-2023-27321",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-27321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json"
}
],
"title": "CVE-2023-27321"
},
{
"cve": "CVE-2023-32735",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-32735",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32735.json"
}
],
"title": "CVE-2023-32735"
},
{
"cve": "CVE-2023-32737",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-32737",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32737.json"
}
],
"title": "CVE-2023-32737"
},
{
"cve": "CVE-2023-46720",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-46720",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46720.json"
}
],
"title": "CVE-2023-46720"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52237",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1496944",
"CSAFPID-1496945"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1496944",
"CSAFPID-1496945"
]
}
],
"title": "CVE-2023-52237"
},
{
"cve": "CVE-2023-52238",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52238.json"
}
],
"title": "CVE-2023-52238"
},
{
"cve": "CVE-2023-52891",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52891.json"
}
],
"title": "CVE-2023-52891"
},
{
"cve": "CVE-2024-21754",
"cwe": {
"id": "CWE-916",
"name": "Use of Password Hash With Insufficient Computational Effort"
},
"notes": [
{
"category": "other",
"text": "Use of Password Hash With Insufficient Computational Effort",
"title": "CWE-916"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21754",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21754.json"
}
],
"title": "CVE-2024-21754"
},
{
"cve": "CVE-2024-23111",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-23111",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23111.json"
}
],
"title": "CVE-2024-23111"
},
{
"cve": "CVE-2024-26010",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26010",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26010.json"
}
],
"title": "CVE-2024-26010"
},
{
"cve": "CVE-2024-30321",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-30321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30321.json"
}
],
"title": "CVE-2024-30321"
},
{
"cve": "CVE-2024-32055",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32055"
},
{
"cve": "CVE-2024-32056",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-32056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32056.json"
}
],
"title": "CVE-2024-32056"
},
{
"cve": "CVE-2024-32057",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32057",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32057"
},
{
"cve": "CVE-2024-32058",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32058"
},
{
"cve": "CVE-2024-32059",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32059",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32059.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32059"
},
{
"cve": "CVE-2024-32060",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32060"
},
{
"cve": "CVE-2024-32061",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32061"
},
{
"cve": "CVE-2024-32062",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32062"
},
{
"cve": "CVE-2024-32063",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32063",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32063.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32063"
},
{
"cve": "CVE-2024-32064",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32064"
},
{
"cve": "CVE-2024-32065",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32065",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32065"
},
{
"cve": "CVE-2024-32066",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32066"
},
{
"cve": "CVE-2024-33577",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33577.json"
}
],
"title": "CVE-2024-33577"
},
{
"cve": "CVE-2024-33653",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33653",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33653.json"
}
],
"title": "CVE-2024-33653"
},
{
"cve": "CVE-2024-33654",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33654",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33654.json"
}
],
"title": "CVE-2024-33654"
},
{
"cve": "CVE-2024-37996",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
}
],
"title": "CVE-2024-37996"
},
{
"cve": "CVE-2024-37997",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37997",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37997.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
}
],
"title": "CVE-2024-37997"
},
{
"cve": "CVE-2024-38278",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38278",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38278.json"
}
],
"title": "CVE-2024-38278"
},
{
"cve": "CVE-2024-38867",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38867",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38867.json"
}
],
"title": "CVE-2024-38867"
},
{
"cve": "CVE-2024-39567",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39567",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39567.json"
}
],
"title": "CVE-2024-39567"
},
{
"cve": "CVE-2024-39568",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39568",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39568.json"
}
],
"title": "CVE-2024-39568"
},
{
"cve": "CVE-2024-39569",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39569",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39569.json"
}
],
"title": "CVE-2024-39569"
},
{
"cve": "CVE-2024-39570",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39570",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39570.json"
}
],
"title": "CVE-2024-39570"
},
{
"cve": "CVE-2024-39571",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39571",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39571.json"
}
],
"title": "CVE-2024-39571"
},
{
"cve": "CVE-2024-39675",
"cwe": {
"id": "CWE-497",
"name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere",
"title": "CWE-497"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39675",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39675.json"
}
],
"title": "CVE-2024-39675"
},
{
"cve": "CVE-2024-39865",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39865",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39865.json"
}
],
"title": "CVE-2024-39865"
},
{
"cve": "CVE-2024-39866",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"notes": [
{
"category": "other",
"text": "Privilege Defined With Unsafe Actions",
"title": "CWE-267"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39866",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39866.json"
}
],
"title": "CVE-2024-39866"
},
{
"cve": "CVE-2024-39867",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"notes": [
{
"category": "other",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39867",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39867.json"
}
],
"title": "CVE-2024-39867"
},
{
"cve": "CVE-2024-39868",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"notes": [
{
"category": "other",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39868.json"
}
],
"title": "CVE-2024-39868"
},
{
"cve": "CVE-2024-39869",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39869",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39869.json"
}
],
"title": "CVE-2024-39869"
},
{
"cve": "CVE-2024-39870",
"cwe": {
"id": "CWE-602",
"name": "Client-Side Enforcement of Server-Side Security"
},
"notes": [
{
"category": "other",
"text": "Client-Side Enforcement of Server-Side Security",
"title": "CWE-602"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39870",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39870.json"
}
],
"title": "CVE-2024-39870"
},
{
"cve": "CVE-2024-39871",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39871",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39871.json"
}
],
"title": "CVE-2024-39871"
},
{
"cve": "CVE-2024-39872",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"notes": [
{
"category": "other",
"text": "Creation of Temporary File With Insecure Permissions",
"title": "CWE-378"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39872",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39872.json"
}
],
"title": "CVE-2024-39872"
},
{
"cve": "CVE-2024-39873",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Excessive Authentication Attempts",
"title": "CWE-307"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39873",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39873.json"
}
],
"title": "CVE-2024-39873"
},
{
"cve": "CVE-2024-39874",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Excessive Authentication Attempts",
"title": "CWE-307"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39874.json"
}
],
"title": "CVE-2024-39874"
},
{
"cve": "CVE-2024-39875",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39875",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39875.json"
}
],
"title": "CVE-2024-39875"
},
{
"cve": "CVE-2024-39876",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39876",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39876.json"
}
],
"title": "CVE-2024-39876"
},
{
"cve": "CVE-2024-39888",
"cwe": {
"id": "CWE-547",
"name": "Use of Hard-coded, Security-relevant Constants"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded, Security-relevant Constants",
"title": "CWE-547"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497113"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39888",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39888.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1497113"
]
}
],
"title": "CVE-2024-39888"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"title": "CVE-2024-3596"
}
]
}
NCSC-2024-0279
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-07-09T18:40:21.043319Z",
"id": "NCSC-2024-0279",
"initial_release_date": "2024-07-09T18:40:21.043319Z",
"revision_history": [
{
"date": "2024-07-09T18:40:21.043319Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "rfc",
"product": {
"name": "rfc",
"product_id": "CSAFPID-1497114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "ietf"
},
{
"branches": [
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"references": [
{
"category": "self",
"summary": "CVE-2024-21417",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json"
}
],
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-28899",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28899",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30081",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30081",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30098",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35270",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-37969",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37969",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37974",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37981",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json"
}
],
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37986",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37986",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37987",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-38013",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38022",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38022",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38034",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38034",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38041",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json"
}
],
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json"
}
],
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38517",
"references": [
{
"category": "self",
"summary": "CVE-2024-38517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json"
}
],
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-38051",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38051",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38054",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38054",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38060",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json"
}
],
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38085",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"cwe": {
"id": "CWE-166",
"name": "Improper Handling of Missing Special Element"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Missing Special Element",
"title": "CWE-166"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38091",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38102",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-30013",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-30013",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json"
}
],
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497114"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1497114"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37971",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json"
}
],
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37972",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json"
}
],
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37973",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37975",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json"
}
],
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37984",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37984",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json"
}
],
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37988",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37988",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json"
}
],
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38010",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38011",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38017",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json"
}
],
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json"
}
],
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38027",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38027",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38028",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json"
}
],
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38033",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json"
}
],
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38047",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38047",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json"
}
],
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38048",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json"
}
],
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38049",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38050",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json"
}
],
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38052",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38052",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json"
}
],
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38057",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38057",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38065",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38065",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json"
}
],
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38068",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json"
}
],
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38069",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38070",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json"
}
],
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38079",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json"
}
],
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38101",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38101",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json"
}
],
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38105",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-39684",
"references": [
{
"category": "self",
"summary": "CVE-2024-39684",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json"
}
],
"title": "CVE-2024-39684"
},
{
"cve": "CVE-2024-38015",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38015",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json"
}
],
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38071",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json"
}
],
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json"
}
],
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38077",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json"
}
],
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38100",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json"
}
],
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38031",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json"
}
],
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38044",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json"
}
],
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38067",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38067",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json"
}
],
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38073",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json"
}
],
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json"
}
],
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38076",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json"
}
],
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38099",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38099",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json"
}
],
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38059",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38059",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json"
}
],
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38080",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json"
}
],
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-26184",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json"
}
],
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-37977",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37977",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json"
}
],
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-38032",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json"
}
],
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38078",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38078",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json"
}
],
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-37985",
"references": [
{
"category": "self",
"summary": "CVE-2024-37985",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json"
}
],
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37978",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37978",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json"
}
],
"title": "CVE-2024-37978"
}
]
}
NCSC-2024-0282
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDOM, SIMATIC, SINEMA, SIPROTEC en de Engineering Platforms voor diverse systemen.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Privilege Defined With Unsafe Actions",
"title": "CWE-267"
},
{
"category": "general",
"text": "Incorrect User Management",
"title": "CWE-286"
},
{
"category": "general",
"text": "Improper Restriction of Excessive Authentication Attempts",
"title": "CWE-307"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Creation of Temporary File With Insecure Permissions",
"title": "CWE-378"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere",
"title": "CWE-497"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Use of Hard-coded, Security-relevant Constants",
"title": "CWE-547"
},
{
"category": "general",
"text": "Client-Side Enforcement of Server-Side Security",
"title": "CWE-602"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Use of Password Hash With Insufficient Computational Effort",
"title": "CWE-916"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064222.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-088132.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170375.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-313039.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-364175.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-381581.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-698820.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-722010.pdf"
},
{
"category": "external",
"summary": "Reference - siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723487.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-750499.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779936.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824889.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-868282.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-883918.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-928781.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear; siemens",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-998949.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens Producten",
"tracking": {
"current_release_date": "2024-07-09T18:40:57.534939Z",
"id": "NCSC-2024-0282",
"initial_release_date": "2024-07-09T18:40:57.534939Z",
"revision_history": [
{
"date": "2024-07-09T18:40:57.534939Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "jt_open",
"product": {
"name": "jt_open",
"product_id": "CSAFPID-1497083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt_open:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_encryption",
"product": {
"name": "mendix_encryption",
"product_id": "CSAFPID-1497113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_encryption:v10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "plm_xml_sdk",
"product": {
"name": "plm_xml_sdk",
"product_id": "CSAFPID-1497084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:plm_xml_sdk:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ps_iges_parasolid_translator_component",
"product": {
"name": "ps_iges_parasolid_translator_component",
"product_id": "CSAFPID-1464909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ps_iges_parasolid_translator_component:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1496944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497428",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1498045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800",
"product": {
"name": "ruggedcom_i800",
"product_id": "CSAFPID-1497498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800nc",
"product": {
"name": "ruggedcom_i800nc",
"product_id": "CSAFPID-1496945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_i800nc",
"product": {
"name": "ruggedcom_i800nc",
"product_id": "CSAFPID-1497536",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:4.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1498050",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1498073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom",
"product": {
"name": "ruggedcom",
"product_id": "CSAFPID-1497817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32260",
"cwe": {
"id": "CWE-286",
"name": "Incorrect User Management"
},
"notes": [
{
"category": "other",
"text": "Incorrect User Management",
"title": "CWE-286"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-32260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-32260.json"
}
],
"title": "CVE-2022-32260"
},
{
"cve": "CVE-2023-7066",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-7066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7066.json"
}
],
"title": "CVE-2023-7066"
},
{
"cve": "CVE-2023-27321",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-27321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json"
}
],
"title": "CVE-2023-27321"
},
{
"cve": "CVE-2023-32735",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-32735",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32735.json"
}
],
"title": "CVE-2023-32735"
},
{
"cve": "CVE-2023-32737",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-32737",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32737.json"
}
],
"title": "CVE-2023-32737"
},
{
"cve": "CVE-2023-46720",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-46720",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46720.json"
}
],
"title": "CVE-2023-46720"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52237",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1496944",
"CSAFPID-1496945"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1496944",
"CSAFPID-1496945"
]
}
],
"title": "CVE-2023-52237"
},
{
"cve": "CVE-2023-52238",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52238.json"
}
],
"title": "CVE-2023-52238"
},
{
"cve": "CVE-2023-52891",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52891.json"
}
],
"title": "CVE-2023-52891"
},
{
"cve": "CVE-2024-21754",
"cwe": {
"id": "CWE-916",
"name": "Use of Password Hash With Insufficient Computational Effort"
},
"notes": [
{
"category": "other",
"text": "Use of Password Hash With Insufficient Computational Effort",
"title": "CWE-916"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21754",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21754.json"
}
],
"title": "CVE-2024-21754"
},
{
"cve": "CVE-2024-23111",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-23111",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23111.json"
}
],
"title": "CVE-2024-23111"
},
{
"cve": "CVE-2024-26010",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26010",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26010.json"
}
],
"title": "CVE-2024-26010"
},
{
"cve": "CVE-2024-30321",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-30321",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30321.json"
}
],
"title": "CVE-2024-30321"
},
{
"cve": "CVE-2024-32055",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32055",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32055.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32055"
},
{
"cve": "CVE-2024-32056",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-32056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32056.json"
}
],
"title": "CVE-2024-32056"
},
{
"cve": "CVE-2024-32057",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32057",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32057"
},
{
"cve": "CVE-2024-32058",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32058",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32058"
},
{
"cve": "CVE-2024-32059",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32059",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32059.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32059"
},
{
"cve": "CVE-2024-32060",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32060",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32060.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32060"
},
{
"cve": "CVE-2024-32061",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32061"
},
{
"cve": "CVE-2024-32062",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32062"
},
{
"cve": "CVE-2024-32063",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32063",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32063.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32063"
},
{
"cve": "CVE-2024-32064",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32064"
},
{
"cve": "CVE-2024-32065",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32065",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32065"
},
{
"cve": "CVE-2024-32066",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464909"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32066",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464909"
]
}
],
"title": "CVE-2024-32066"
},
{
"cve": "CVE-2024-33577",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33577.json"
}
],
"title": "CVE-2024-33577"
},
{
"cve": "CVE-2024-33653",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33653",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33653.json"
}
],
"title": "CVE-2024-33653"
},
{
"cve": "CVE-2024-33654",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33654",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33654.json"
}
],
"title": "CVE-2024-33654"
},
{
"cve": "CVE-2024-37996",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
}
],
"title": "CVE-2024-37996"
},
{
"cve": "CVE-2024-37997",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37997",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37997.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1497083",
"CSAFPID-1497084"
]
}
],
"title": "CVE-2024-37997"
},
{
"cve": "CVE-2024-38278",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38278",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38278.json"
}
],
"title": "CVE-2024-38278"
},
{
"cve": "CVE-2024-38867",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38867",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38867.json"
}
],
"title": "CVE-2024-38867"
},
{
"cve": "CVE-2024-39567",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39567",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39567.json"
}
],
"title": "CVE-2024-39567"
},
{
"cve": "CVE-2024-39568",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39568",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39568.json"
}
],
"title": "CVE-2024-39568"
},
{
"cve": "CVE-2024-39569",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39569",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39569.json"
}
],
"title": "CVE-2024-39569"
},
{
"cve": "CVE-2024-39570",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39570",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39570.json"
}
],
"title": "CVE-2024-39570"
},
{
"cve": "CVE-2024-39571",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39571",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39571.json"
}
],
"title": "CVE-2024-39571"
},
{
"cve": "CVE-2024-39675",
"cwe": {
"id": "CWE-497",
"name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere",
"title": "CWE-497"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39675",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39675.json"
}
],
"title": "CVE-2024-39675"
},
{
"cve": "CVE-2024-39865",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39865",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39865.json"
}
],
"title": "CVE-2024-39865"
},
{
"cve": "CVE-2024-39866",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"notes": [
{
"category": "other",
"text": "Privilege Defined With Unsafe Actions",
"title": "CWE-267"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39866",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39866.json"
}
],
"title": "CVE-2024-39866"
},
{
"cve": "CVE-2024-39867",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"notes": [
{
"category": "other",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39867",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39867.json"
}
],
"title": "CVE-2024-39867"
},
{
"cve": "CVE-2024-39868",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"notes": [
{
"category": "other",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39868.json"
}
],
"title": "CVE-2024-39868"
},
{
"cve": "CVE-2024-39869",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39869",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39869.json"
}
],
"title": "CVE-2024-39869"
},
{
"cve": "CVE-2024-39870",
"cwe": {
"id": "CWE-602",
"name": "Client-Side Enforcement of Server-Side Security"
},
"notes": [
{
"category": "other",
"text": "Client-Side Enforcement of Server-Side Security",
"title": "CWE-602"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39870",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39870.json"
}
],
"title": "CVE-2024-39870"
},
{
"cve": "CVE-2024-39871",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39871",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39871.json"
}
],
"title": "CVE-2024-39871"
},
{
"cve": "CVE-2024-39872",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"notes": [
{
"category": "other",
"text": "Creation of Temporary File With Insecure Permissions",
"title": "CWE-378"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39872",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39872.json"
}
],
"title": "CVE-2024-39872"
},
{
"cve": "CVE-2024-39873",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Excessive Authentication Attempts",
"title": "CWE-307"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39873",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39873.json"
}
],
"title": "CVE-2024-39873"
},
{
"cve": "CVE-2024-39874",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Excessive Authentication Attempts",
"title": "CWE-307"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39874.json"
}
],
"title": "CVE-2024-39874"
},
{
"cve": "CVE-2024-39875",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39875",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39875.json"
}
],
"title": "CVE-2024-39875"
},
{
"cve": "CVE-2024-39876",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39876",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39876.json"
}
],
"title": "CVE-2024-39876"
},
{
"cve": "CVE-2024-39888",
"cwe": {
"id": "CWE-547",
"name": "Use of Hard-coded, Security-relevant Constants"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded, Security-relevant Constants",
"title": "CWE-547"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1497113"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39888",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39888.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1497113"
]
}
],
"title": "CVE-2024-39888"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"title": "CVE-2024-3596"
}
]
}
CERTFR-2025-AVI-0580
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Gemfire versions ant\u00e9rieures \u00e0 9.15.16",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
}
],
"initial_release_date": "2025-07-10T00:00:00",
"last_revision_date": "2025-07-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0580",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35894",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35894"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35929",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35929"
}
]
}
CERTFR-2024-AVI-0827
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Juniper Networks. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 22.4.x antérieures à 22.4R3-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.3.x antérieures à 22.3R3-S4-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4.x antérieures à 23.4R2-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2.x antérieures à 23.2R2-S3-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 22.2.x antérieures à 22.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2.x antérieures à 24.2R2 pour cRPD | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.2.x antérieures à 22.2R3-S5-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4.x antérieures à 23.4R3-S5 pour cRPD | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2.x antérieures à 24.2R2-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4.x antérieures à 23.4R2-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.4R3-S9 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.4.x antérieures à 22.4R3-S5-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S9-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2.x antérieures à 23.2R2-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2.x antérieures à 24.2R2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 22.4.x ant\u00e9rieures \u00e0 22.4R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.3.x ant\u00e9rieures \u00e0 22.3R3-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4.x ant\u00e9rieures \u00e0 23.4R2-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2.x ant\u00e9rieures \u00e0 23.2R2-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2.x ant\u00e9rieures \u00e0 22.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2.x ant\u00e9rieures \u00e0 24.2R2 pour cRPD",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2.x ant\u00e9rieures \u00e0 22.2R3-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4.x ant\u00e9rieures \u00e0 23.4R3-S5 pour cRPD",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2.x ant\u00e9rieures \u00e0 24.2R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4.x ant\u00e9rieures \u00e0 23.4R2-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4.x ant\u00e9rieures \u00e0 22.4R3-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S9-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2.x ant\u00e9rieures \u00e0 23.2R2-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2.x ant\u00e9rieures \u00e0 24.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
}
],
"initial_release_date": "2024-10-01T00:00:00",
"last_revision_date": "2024-10-01T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0827",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Juniper Networks. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88210",
"url": "https://supportportal.juniper.net/s/article/2024-09-30-Out-of-Cycle-Security-Advisory-Multiple-Products-RADIUS-protocol-susceptible-to-forgery-attacks-Blast-RADIUS-CVE-2024-3596"
}
]
}
CERTFR-2024-AVI-0552
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M876-3 (6GK5876-3AA02-2BA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE X310FE (6GK5310-0BA10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X304-2FE (6GK5304-2BD00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-3 (6GK5307-3BL00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-3 (6GK5307-3BL10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-3LD (6GK5307-3BM00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X307-3LD (6GK5307-3BM10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2 (6GK5308-2FL00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2 (6GK5308-2FL10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2LD (6GK5308-2FM00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2LD (6GK5308-2FM10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2LH (6GK5308-2FN00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2LH (6GK5308-2FN10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2M (6GK5308-2GG00-2AA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2M (6GK5308-2GG10-2AA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2M TS (6GK5308-2GG00-2CA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X308-2M TS (6GK5308-2GG10-2CA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X310 (6GK5310-0FA00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X310 (6GK5310-0FA10-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X310FE (6GK5310-0BA00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X320-1 FE (6GK5320-1BD00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE X408-2 (6GK5408-2FD00-2AA2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208 (6GK5208-0BA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208EEC (6GK5208-0BA00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208G (6GK5208-0GA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216 (6GK5216-0BA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216-4C (6GK5216-4BS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC216EEC (6GK5216-0BA00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC224 (6GK5224-0BA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XCH328 (6GK5328-4TS01-2EC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XCM324 (6GK5324-8TS01-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XCM328 (6GK5328-4TS01-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XCM332 (6GK5332-0GA01-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XF204 (6GK5204-0BA00-2GF2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP208 (6GK5208-0HA00-2AS6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP208EEC (6GK5208-0HA00-2ES6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP216 (6GK5216-0HA00-2AS6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP216EEC (6GK5216-0HA00-2ES6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIMATIC WinCC toutes versions pour la vulnérabilité CVE-2024-30321 | ||
| Siemens | N/A | SIMATIC WinCC toutes versions versions antérieures à V19 Update 2 | ||
| Siemens | N/A | SIMATIC WinCC toutes versions versions antérieures à V7.4 SP1 Update 23 | ||
| Siemens | N/A | SIMATIC WinCC toutes versions versions antérieures à V7.5 SP2 Update 17 | ||
| Siemens | N/A | SIMATIC WinCC toutes versions versions antérieures à V8.0 Update 5 | ||
| Siemens | N/A | SIMATIC Compact Field Unit toutes versions pour la vulnérabilité CVE-2017-12741 | ||
| Siemens | N/A | SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) versions antérieures à V1.0.2 | ||
| Siemens | N/A | SIMATIC ET 200M (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200MP IM 155-5 PN BA (6ES7155-5AA00-0AA0) versions antérieures à V4.0.2 | ||
| Siemens | N/A | SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) versions antérieures à V4.2.0 | ||
| Siemens | N/A | SIMATIC ET 200MP IM 155-5 PN ST (6ES7155-5AA00-0AB0) versions antérieures à V4.1.0 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN BA (6ES7155-6AR00-0AN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) versions antérieures à V1.1.0 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN HF (6ES7155-6AU00-0CN0) versions antérieures à V4.2.0 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN HS (6ES7155-6AU00-0DN0) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU00-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU01-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA00-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA01-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200pro IM 154-3 PN HF (6ES7154-3AB00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET 200pro IM 154-4 PN HF (6ES7154-4AB10-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200S (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12 (6ES7141-6BH00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12 (6ES7142-6BH00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 4AO U/I 4xM12 (6ES7145-6HD00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12 (6ES7147-6BG00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12 (6ES7142-6BR00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12 (6ES7144-6KD50-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12 (6ES7144-6KD00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | TIA Portal Cloud V3.0 toutes versions versions antérieures à V18 Update 2 | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12 (6ES7141-6BF00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12 (6ES7141-6BG00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12 (6ES7142-6BF50-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12 (6ES7142-6BF00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12 (6ES7142-6BG00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC ET200ecoPN: IO-Link Master (6ES7148-6JA00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741. | ||
| Siemens | N/A | SIMATIC Energy Manager Basic versions antérieures à V7.5 | ||
| Siemens | N/A | SIMATIC Energy Manager PRO versions antérieures à V7.5 | ||
| Siemens | N/A | SIMATIC IPC DiagBase toutes versions pour la vulnérabilité CVE-2023-52891 | ||
| Siemens | N/A | SIMATIC IPC DiagMonitor toutes versions pour la vulnérabilité CVE-2023-52891 | ||
| Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2022-45147. | ||
| Siemens | N/A | SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) versions antérieures à V4.2.0 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU family (incl. SIPLUS variants) versions antérieures à V4.2.3 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) versions antérieures à V2.0 | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller versions antérieures à V2.0 | ||
| Siemens | N/A | SIMATIC S7-200 SMART versions antérieures à V2.03.01 | ||
| Siemens | N/A | SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions versions antérieures à V3.X.16 | ||
| Siemens | N/A | SIMATIC S7-400 H V6 and below CPU family (incl. SIPLUS variants) versions antérieures à V6.0.8 | ||
| Siemens | N/A | SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) versions antérieures à V6.0.6 | ||
| Siemens | N/A | SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) versions antérieures à V7.0.2 | ||
| Siemens | N/A | SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions antérieures à V8.2.1 | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V16 toutes versions versions antérieures à V16 Update 7 | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V17 toutes versions versions antérieures à V17 Update 7 | ||
| Siemens | N/A | SIMATIC STEP 7 Safety V18 toutes versions versions antérieures à V18 Update 2 | ||
| Siemens | N/A | SIMATIC STEP 7 V16 toutes versions versions antérieures à V16 Update 7 | ||
| Siemens | N/A | SIMATIC STEP 7 V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2022-45147. | ||
| Siemens | N/A | SIMATIC STEP 7 V17 toutes versions versions antérieures à V17 Update 7 | ||
| Siemens | N/A | SIMATIC STEP 7 V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2022-45147. | ||
| Siemens | N/A | SIMATIC STEP 7 V18 toutes versions versions antérieures à V18 Update 2 | ||
| Siemens | N/A | SIMATIC TDC CP51M1 versions antérieures à V1.1.8 | ||
| Siemens | N/A | SIMATIC TDC CPU555 versions antérieures à V1.1.1 | ||
| Siemens | N/A | SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0) toutes versions versions antérieures à V2010 SP3 | ||
| Siemens | N/A | SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0) toutes versions versions antérieures à V2010 SP3 | ||
| Siemens | N/A | SIMATIC WinCC Unified V16 toutes versions versions antérieures à V16 Update 7 | ||
| Siemens | N/A | SIMATIC WinCC Unified V17 toutes versions versions antérieures à V17 Update 7 | ||
| Siemens | N/A | SIMATIC WinCC Unified V18 toutes versions versions antérieures à V18 Update 2 | ||
| Siemens | N/A | SIMATIC WinCC V16 versions antérieures à V16.7 | ||
| Siemens | N/A | SIMATIC WinCC V17 versions antérieures à V17.7 | ||
| Siemens | N/A | SIMATIC WinCC V18 toutes versions versions antérieures à V18 Update 2 | ||
| Siemens | N/A | SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3) versions antérieures à V4.1.8 | ||
| Siemens | N/A | SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (6GK5876-3AA02-2BA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310FE (6GK5310-0BA10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3 (6GK5307-3BL00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3 (6GK5307-3BL10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2 (6GK5308-2FL00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2 (6GK5308-2FL10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M (6GK5308-2GG00-2AA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M (6GK5308-2GG10-2AA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310 (6GK5310-0FA00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310 (6GK5310-0FA10-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310FE (6GK5310-0BA00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X408-2 (6GK5408-2FD00-2AA2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208 (6GK5208-0BA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208G (6GK5208-0GA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216 (6GK5216-0BA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC224 (6GK5224-0BA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204 (6GK5204-0BA00-2GF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP208 (6GK5208-0HA00-2AS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP216 (6GK5216-0HA00-2AS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-30321",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC toutes versions versions ant\u00e9rieures \u00e0 V19 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC toutes versions versions ant\u00e9rieures \u00e0 V7.4 SP1 Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC toutes versions versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC toutes versions versions ant\u00e9rieures \u00e0 V8.0 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Compact Field Unit toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) versions ant\u00e9rieures \u00e0 V1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200M (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200MP IM 155-5 PN BA (6ES7155-5AA00-0AA0) versions ant\u00e9rieures \u00e0 V4.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) versions ant\u00e9rieures \u00e0 V4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200MP IM 155-5 PN ST (6ES7155-5AA00-0AB0) versions ant\u00e9rieures \u00e0 V4.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN BA (6ES7155-6AR00-0AN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V1.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN HF (6ES7155-6AU00-0CN0) versions ant\u00e9rieures \u00e0 V4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN HS (6ES7155-6AU00-0DN0) versions ant\u00e9rieures \u00e0 V4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU00-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU01-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA00-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA01-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200pro IM 154-3 PN HF (6ES7154-3AB00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200pro IM 154-4 PN HF (6ES7154-4AB10-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200S (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12 (6ES7141-6BH00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12 (6ES7142-6BH00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 4AO U/I 4xM12 (6ES7145-6HD00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12 (6ES7147-6BG00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12 (6ES7142-6BR00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12 (6ES7144-6KD50-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12 (6ES7144-6KD00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Portal Cloud V3.0 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12 (6ES7141-6BF00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12 (6ES7141-6BG00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12 (6ES7142-6BF50-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12 (6ES7142-6BF00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12 (6ES7142-6BG00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200ecoPN: IO-Link Master (6ES7148-6JA00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Energy Manager Basic versions ant\u00e9rieures \u00e0 V7.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Energy Manager PRO versions ant\u00e9rieures \u00e0 V7.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC DiagBase toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-52891",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC DiagMonitor toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-52891",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.1 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2022-45147.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V4.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) versions ant\u00e9rieures \u00e0 V2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 Software Controller versions ant\u00e9rieures \u00e0 V2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-200 SMART versions ant\u00e9rieures \u00e0 V2.03.01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions versions ant\u00e9rieures \u00e0 V3.X.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 H V6\u00a0and below\u00a0CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V6.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V6.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V7.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V8.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V16 toutes versions versions ant\u00e9rieures \u00e0 V16 Update 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V17 toutes versions versions ant\u00e9rieures \u00e0 V17 Update 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 Safety V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V16 toutes versions versions ant\u00e9rieures \u00e0 V16 Update 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2022-45147.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 toutes versions versions ant\u00e9rieures \u00e0 V17 Update 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2022-45147.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC TDC CP51M1 versions ant\u00e9rieures \u00e0 V1.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC TDC CPU555 versions ant\u00e9rieures \u00e0 V1.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0) toutes versions versions ant\u00e9rieures \u00e0 V2010 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0) toutes versions versions ant\u00e9rieures \u00e0 V2010 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V16 toutes versions versions ant\u00e9rieures \u00e0 V16 Update 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V17 toutes versions versions ant\u00e9rieures \u00e0 V17 Update 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC Unified V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V16 versions ant\u00e9rieures \u00e0 V16.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V17 versions ant\u00e9rieures \u00e0 V17.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3) versions ant\u00e9rieures \u00e0 V4.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-45147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45147"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-32735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32735"
},
{
"name": "CVE-2024-30321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30321"
},
{
"name": "CVE-2023-52891",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52891"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2024-38867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38867"
},
{
"name": "CVE-2023-32737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32737"
},
{
"name": "CVE-2023-52237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52237"
},
{
"name": "CVE-2024-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38278"
},
{
"name": "CVE-2023-52238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52238"
},
{
"name": "CVE-2024-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39675"
}
],
"initial_release_date": "2024-07-09T00:00:00",
"last_revision_date": "2024-07-09T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0552",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-883918",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-883918.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-723487",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-779936",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-779936.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-825651",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-825651.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-750499",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-750499.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-088132",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-088132.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-313039",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-313039.html"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-170375",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html"
}
]
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"initial_release_date": "2025-06-19T00:00:00",
"last_revision_date": "2025-06-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
CERTFR-2025-AVI-0583
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Apstra | Apstra versions antérieures à 6.0.0 | ||
| Juniper Networks | Security Director | Security Director versions antérieures à 24.4.1-1703 | ||
| Juniper Networks | CTPView | CTPview versions antérieures à 9.3R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apstra versions ant\u00e9rieures \u00e0 6.0.0",
"product": {
"name": "Apstra",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director versions ant\u00e9rieures \u00e0 24.4.1-1703",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPview versions ant\u00e9rieures \u00e0 9.3R2",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52984"
},
{
"name": "CVE-2020-10136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10136"
},
{
"name": "CVE-2024-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
},
{
"name": "CVE-2024-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
},
{
"name": "CVE-2025-52950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52950"
},
{
"name": "CVE-2025-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52983"
},
{
"name": "CVE-2025-52952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52952"
},
{
"name": "CVE-2025-52963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52963"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-26466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
},
{
"name": "CVE-2024-23984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
},
{
"name": "CVE-2025-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52986"
},
{
"name": "CVE-2025-52988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52988"
},
{
"name": "CVE-2025-52949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52949"
},
{
"name": "CVE-2025-6549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6549"
},
{
"name": "CVE-2025-52954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52954"
},
{
"name": "CVE-2024-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7595"
},
{
"name": "CVE-2025-52947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52947"
},
{
"name": "CVE-2025-52958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52958"
},
{
"name": "CVE-2025-52964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52964"
},
{
"name": "CVE-2025-52946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52946"
},
{
"name": "CVE-2024-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
},
{
"name": "CVE-2025-52951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52951"
},
{
"name": "CVE-2025-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23019"
},
{
"name": "CVE-2025-52955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52955"
},
{
"name": "CVE-2025-23018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23018"
},
{
"name": "CVE-2025-52948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52948"
},
{
"name": "CVE-2025-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52981"
},
{
"name": "CVE-2024-24968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
},
{
"name": "CVE-2025-52953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52953"
},
{
"name": "CVE-2025-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52985"
},
{
"name": "CVE-2025-52989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52989"
},
{
"name": "CVE-2025-52980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52980"
},
{
"name": "CVE-2025-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52982"
},
{
"name": "CVE-2025-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30661"
}
],
"initial_release_date": "2025-07-10T00:00:00",
"last_revision_date": "2025-07-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0583",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52988",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52963",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52958",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52985",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52986",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2024-3596",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52989",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52981",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52983",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52946",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52954",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52953",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52947",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52949",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-26466",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52955",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52952",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-30661",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52951",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52984",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52948",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52964",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52982",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52950",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52980",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-6549",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
}
]
}
CERTFR-2024-AVI-0677
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.2 | ||
| Fortinet | FortiSwitchManager | FortiSwitchManager versions 7.x antérieures à 7.2.2 | ||
| Fortinet | FortiProxy | FortiProxy versions antérieures à 7.4 | ||
| Fortinet | FortiPAM | FortiPAM versions antérieures à 1.4 | ||
| Fortinet | FortiDDoS | FortiDDoS versions 5.7.x antérieures à 5.7.1 | ||
| Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.2.x antérieures à 7.2.5 | ||
| Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.4.x antérieures à 7.4.2 | ||
| Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.0.x antérieures à 7.0.11 | ||
| Fortinet | FortiOS | FortiOS versions 7.2.x antérieures à 7.2.8 | ||
| Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.4 | ||
| Fortinet | FortiSOAR | FortiSOAR versions 7.4.x antérieures à 7.4.1 | ||
| Fortinet | FortiManager | FortiManager versions 7.0.x antérieures à 7.0.11 | ||
| Fortinet | FortiDDoS | FortiDDoS versions antérieures à 5.6.2 | ||
| Fortinet | FortiOS | FortiOS versions antérieures à 7.0.15 | ||
| Fortinet | FortiDDoS | FortiDDoS-F versions 6.5.x antérieures à 6.5.1 | ||
| Fortinet | FortiManager | FortiManager versions 7.2.x antérieures à 7.2.5 | ||
| Fortinet | FortiDDoS | FortiDDoS-F versions 6.x antérieures à 6.4.2 | ||
| Fortinet | FortiSOAR | FortiSOAR versions antérieures à 7.3.3 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.2",
"product": {
"name": "FortiManager",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiSwitchManager versions 7.x ant\u00e9rieures \u00e0 7.2.2",
"product": {
"name": "FortiSwitchManager",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiProxy versions ant\u00e9rieures \u00e0 7.4",
"product": {
"name": "FortiProxy",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiPAM versions ant\u00e9rieures \u00e0 1.4",
"product": {
"name": "FortiPAM",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiDDoS versions 5.7.x ant\u00e9rieures \u00e0 5.7.1",
"product": {
"name": "FortiDDoS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAnalyzer versions 7.2.x ant\u00e9rieures \u00e0 7.2.5",
"product": {
"name": "FortiAnalyzer",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.2",
"product": {
"name": "FortiAnalyzer",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAnalyzer versions 7.0.x ant\u00e9rieures \u00e0 7.0.11",
"product": {
"name": "FortiAnalyzer",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiOS versions 7.2.x ant\u00e9rieures \u00e0 7.2.8",
"product": {
"name": "FortiOS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.4",
"product": {
"name": "FortiOS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiSOAR versions 7.4.x ant\u00e9rieures \u00e0 7.4.1",
"product": {
"name": "FortiSOAR",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.11",
"product": {
"name": "FortiManager",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiDDoS versions ant\u00e9rieures \u00e0 5.6.2",
"product": {
"name": "FortiDDoS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiOS versions ant\u00e9rieures \u00e0 7.0.15",
"product": {
"name": "FortiOS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiDDoS-F versions 6.5.x ant\u00e9rieures \u00e0 6.5.1",
"product": {
"name": "FortiDDoS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.5",
"product": {
"name": "FortiManager",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiDDoS-F versions 6.x ant\u00e9rieures \u00e0 6.4.2",
"product": {
"name": "FortiDDoS",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiSOAR versions ant\u00e9rieures \u00e0 7.3.3",
"product": {
"name": "FortiSOAR",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-21757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21757"
},
{
"name": "CVE-2023-26211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26211"
},
{
"name": "CVE-2024-36505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36505"
},
{
"name": "CVE-2022-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45862"
},
{
"name": "CVE-2022-27486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27486"
}
],
"initial_release_date": "2024-08-14T00:00:00",
"last_revision_date": "2024-08-14T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0677",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet",
"vendor_advisories": [
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-088",
"url": "https://www.fortiguard.com/psirt/FG-IR-23-088"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-445",
"url": "https://www.fortiguard.com/psirt/FG-IR-22-445"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-467",
"url": "https://www.fortiguard.com/psirt/FG-IR-23-467"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-255",
"url": "https://www.fortiguard.com/psirt/FG-IR-24-255"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-047",
"url": "https://www.fortiguard.com/psirt/FG-IR-22-047"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-012",
"url": "https://www.fortiguard.com/psirt/FG-IR-24-012"
}
]
}
CERTFR-2024-AVI-0550
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans le protocole RADIUS. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| FreeRadius | FreeRADIUS | FreeRadius versions 3.2.x antérieures à 3.2.5 FreeRadius versions antérieures à 3.0.27 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "FreeRadius versions 3.2.x ant\u00e9rieures \u00e0 3.2.5\nFreeRadius versions ant\u00e9rieures \u00e0 3.0.27",
"product": {
"name": "FreeRADIUS",
"vendor": {
"name": "FreeRadius",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
}
],
"initial_release_date": "2024-07-09T00:00:00",
"last_revision_date": "2024-07-09T00:00:00",
"links": [
{
"title": "Avis de s\u00e9curit\u00e9 CERT Carnegie Mellon University VU#456537 du 09 juillet 2024",
"url": "https://kb.cert.org/vuls/id/456537"
}
],
"reference": "CERTFR-2024-AVI-0550",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le protocole RADIUS. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans le protocole RADIUS",
"vendor_advisories": [
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 FreeRadius",
"url": "https://www.freeradius.org/security/"
}
]
}
CERTFR-2024-AVI-0557
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Microsoft indique que les vulnérabilités CVE-2024-38080 et CVE-2024-38112 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4651 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.24975 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27219 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4651 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22074 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4651 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.2582 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4651 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7159 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2582 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3880 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20710 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22769 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.4651 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows 11 version 21H2 pour systèmes x64 antérieures à 10.0.22000.3079 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.24975 | ||
| Microsoft | N/A | Windows 11 version 21H2 pour systèmes ARM64 antérieures à 10.0.22000.3079 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27219 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1009 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4651 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22074 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20710 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.3880 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6054 | ||
| Microsoft | N/A | Azure Network Watcher VM Extension pour Windows versions antérieures à 1.4.3320.1 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6054 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.24975",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27219",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2582",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7159",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2582",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20710",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22769",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 ant\u00e9rieures \u00e0 10.0.22000.3079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.24975",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 ant\u00e9rieures \u00e0 10.0.22000.3079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27219",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1009",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4651",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20710",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Network Watcher VM Extension pour Windows versions ant\u00e9rieures \u00e0 1.4.3320.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6054",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-28899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28899"
},
{
"name": "CVE-2024-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38010"
},
{
"name": "CVE-2024-38028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38028"
},
{
"name": "CVE-2024-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37970"
},
{
"name": "CVE-2024-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38077"
},
{
"name": "CVE-2024-38049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38049"
},
{
"name": "CVE-2024-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37989"
},
{
"name": "CVE-2024-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37987"
},
{
"name": "CVE-2024-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38074"
},
{
"name": "CVE-2024-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37973"
},
{
"name": "CVE-2024-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37984"
},
{
"name": "CVE-2024-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37975"
},
{
"name": "CVE-2024-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38055"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-38054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38054"
},
{
"name": "CVE-2024-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38041"
},
{
"name": "CVE-2024-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38102"
},
{
"name": "CVE-2024-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38101"
},
{
"name": "CVE-2024-38050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38050"
},
{
"name": "CVE-2024-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38080"
},
{
"name": "CVE-2024-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38011"
},
{
"name": "CVE-2024-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38062"
},
{
"name": "CVE-2024-30081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30081"
},
{
"name": "CVE-2024-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38112"
},
{
"name": "CVE-2024-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38104"
},
{
"name": "CVE-2024-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38067"
},
{
"name": "CVE-2024-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38043"
},
{
"name": "CVE-2024-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38047"
},
{
"name": "CVE-2024-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39684"
},
{
"name": "CVE-2024-38056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38056"
},
{
"name": "CVE-2024-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38057"
},
{
"name": "CVE-2024-35270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35270"
},
{
"name": "CVE-2024-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38071"
},
{
"name": "CVE-2024-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37974"
},
{
"name": "CVE-2024-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37978"
},
{
"name": "CVE-2024-37971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37971"
},
{
"name": "CVE-2024-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38085"
},
{
"name": "CVE-2024-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38053"
},
{
"name": "CVE-2024-38032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38032"
},
{
"name": "CVE-2024-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38076"
},
{
"name": "CVE-2024-37981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37981"
},
{
"name": "CVE-2024-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38052"
},
{
"name": "CVE-2024-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38015"
},
{
"name": "CVE-2024-38025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38025"
},
{
"name": "CVE-2024-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37988"
},
{
"name": "CVE-2024-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38061"
},
{
"name": "CVE-2024-38030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38030"
},
{
"name": "CVE-2024-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38065"
},
{
"name": "CVE-2024-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38078"
},
{
"name": "CVE-2024-26184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26184"
},
{
"name": "CVE-2024-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37969"
},
{
"name": "CVE-2024-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38072"
},
{
"name": "CVE-2024-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37972"
},
{
"name": "CVE-2024-30079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30079"
},
{
"name": "CVE-2024-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38013"
},
{
"name": "CVE-2024-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38069"
},
{
"name": "CVE-2024-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38022"
},
{
"name": "CVE-2024-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38034"
},
{
"name": "CVE-2024-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21417"
},
{
"name": "CVE-2024-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38048"
},
{
"name": "CVE-2024-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38051"
},
{
"name": "CVE-2024-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38079"
},
{
"name": "CVE-2024-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37985"
},
{
"name": "CVE-2024-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38066"
},
{
"name": "CVE-2024-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38100"
},
{
"name": "CVE-2024-30071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30071"
},
{
"name": "CVE-2024-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38031"
},
{
"name": "CVE-2024-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38105"
},
{
"name": "CVE-2024-38073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38073"
},
{
"name": "CVE-2024-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38060"
},
{
"name": "CVE-2024-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38070"
},
{
"name": "CVE-2024-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37986"
},
{
"name": "CVE-2024-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38058"
},
{
"name": "CVE-2024-38517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38517"
},
{
"name": "CVE-2024-30013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30013"
},
{
"name": "CVE-2024-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38033"
},
{
"name": "CVE-2024-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38064"
},
{
"name": "CVE-2024-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38059"
},
{
"name": "CVE-2024-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38068"
},
{
"name": "CVE-2024-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38019"
},
{
"name": "CVE-2024-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38099"
},
{
"name": "CVE-2024-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38027"
},
{
"name": "CVE-2024-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38044"
},
{
"name": "CVE-2024-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38091"
},
{
"name": "CVE-2024-38017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38017"
},
{
"name": "CVE-2024-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37977"
},
{
"name": "CVE-2024-30098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30098"
}
],
"initial_release_date": "2024-07-10T00:00:00",
"last_revision_date": "2024-07-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0557",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2024-38080 et CVE-2024-38112 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38031",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38044",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38053",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38028",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38054",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38068",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38073",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38105"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38059",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38059"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37978",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38074",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38022"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38057",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-26184",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38061",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38099",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38112",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38025",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38071",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38048",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37985"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38034",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38010",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38032",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38032"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38019",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38011",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37987",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37973",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38055",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30098",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38058",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38058"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38062",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38062"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30081",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38041",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37975",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37989",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38060",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37988",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37972",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38027",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38102"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38091",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-39684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38080",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38015",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38015"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38047",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38047"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38077",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38076",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38076"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30079"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38101",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38101"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38064",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-21417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21417"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-28899",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38517",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38017",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38069"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38070",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38070"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38065",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-3596",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-3596"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38050",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38085",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38033",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38033"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-35270",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38072",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30013",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38013",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38013"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38067",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38043",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38043"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38030"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37986",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38078",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38078"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30071",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37981",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38049",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38051",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38056",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38056"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38066",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37974",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974"
}
]
}
CERTFR-2024-AVI-0648
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SonicWall. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des mesures de contournement (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Sonicwall | N/A | SMA 1000 (SMA 6200/7200/6210/7210, SMA 8200v et SRA EX 7000) versions antérieures à Platform Hotfix - 12.4.3-02667 | ||
| Sonicwall | N/A | L'ensemble des produits SonicWall utilisant l'authentification RADIUS pour la vulnérabilité CVE-2024-3596 | ||
| Sonicwall | N/A | NSM On-Premise versions antérieures à 2.4.4-R4-949 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SMA 1000 (SMA 6200/7200/6210/7210, SMA 8200v et SRA EX 7000) versions ant\u00e9rieures \u00e0 Platform Hotfix - 12.4.3-02667",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "L\u0027ensemble des produits SonicWall utilisant l\u0027authentification RADIUS pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "NSM On-Premise versions ant\u00e9rieures \u00e0 2.4.4-R4-949",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
}
],
"affected_systems_content": "Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des mesures de contournement (cf. section Documentation).",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
}
],
"initial_release_date": "2024-08-05T00:00:00",
"last_revision_date": "2024-08-05T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0648",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SonicWall. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SonicWall",
"vendor_advisories": [
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 SonicWall SNWLID-2024-0010",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010"
},
{
"published_at": "2024-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 SonicWall SNWLID-2024-0014",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
}
]
}
CERTFR-2024-AVI-0652
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Cisco. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des configurations vuln\u00e9rables des \u00e9quipements (cf. section Documentation).",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
}
],
"initial_release_date": "2024-08-05T00:00:00",
"last_revision_date": "2024-08-05T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0652",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Cisco. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Cisco",
"vendor_advisories": [
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-radius-spoofing-july-2024-87cCDwZ3",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
}
]
}
CERTFR-2024-AVI-0804
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.4.x à 4.7.x antérieures à 4.7.9 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions antérieures à 4.3.30 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.8.x antérieures à 4.8.3 | ||
| Stormshield | Stormshield Network VPN Client | Stormshield VPN Client Exclusive sans le correctif de sécurité EC VULN IS 1986 | ||
| Stormshield | Stormshield Network VPN Client | Stormshield VPN Client Standard sans le correctif de sécurité VULN EC IS 1992 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 4.4.x \u00e0 4.7.x ant\u00e9rieures \u00e0 4.7.9",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions ant\u00e9rieures \u00e0 4.3.30",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.8.x ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield VPN Client Exclusive sans le correctif de s\u00e9curit\u00e9 EC VULN IS 1986",
"product": {
"name": "Stormshield Network VPN Client",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield VPN Client Standard sans le correctif de s\u00e9curit\u00e9 VULN EC IS 1992",
"product": {
"name": "Stormshield Network VPN Client",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39706"
},
{
"name": "CVE-2024-45750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45750"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
}
],
"initial_release_date": "2024-09-25T00:00:00",
"last_revision_date": "2024-09-25T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0804",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Stormshield. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Stormshield Network Security",
"vendor_advisories": [
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 StormShield 2024-030",
"url": "https://advisories.stormshield.eu/2024-030/"
},
{
"published_at": "2024-09-25",
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2024-031",
"url": "https://advisories.stormshield.eu/2024-031/"
},
{
"published_at": "2024-09-24",
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2024-024",
"url": "https://advisories.stormshield.eu/2024-024/"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0397
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIPROTEC 5 7SL87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SL86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SD86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SX85 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 6MD85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | POWER METER SICAM Q100 family versions antérieures à V2.70 | ||
| Siemens | N/A | SIPROTEC 5 6MD89 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7UT87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7VK87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) V17 toutes versions | ||
| Siemens | N/A | SIPROTEC 5 7ST85 (CP300) versions antérieures à V9.68 | ||
| Siemens | N/A | SIPROTEC 5 6MD84 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) V18 toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo versions antérieures à V5.0 Update 1 | ||
| Siemens | N/A | SIPROTEC 5 7SJ86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SD87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | POWER METER SICAM Q200 family toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SK85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7UT85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7VU85 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) V19 toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo V4.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176. | ||
| Siemens | N/A | SIMATIC PCS neo versions antérieures à V4.1 Update 3 | ||
| Siemens | N/A | SIMATIC IPC RS-828A toutes versions pour la vulnérabilité CVE-2024-54085 | ||
| Siemens | N/A | SIPROTEC 5 7SJ85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SCALANCE LPE9403 toutes versions pour les vulnérabilités CVE-2025-40581, CVE-2025-40582 et CVE-2025-40583. | ||
| Siemens | N/A | Desigo CC toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo V5.0 toutes versions pour les vulnérabilités CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176. | ||
| Siemens | N/A | SIPROTEC 5 7ST86 (CP300) versions antérieures à V9.83 | ||
| Siemens | N/A | SCALANCE LPE9403 toutes versions pour les vulnérabilités CVE-2025-40572, CVE-2025-40573, CVE-2025-40574, CVE-2025-40575, CVE-2025-40576, CVE-2025-40577, CVE-2025-40578, CVE-2025-40579 et CVE-2025-40580. | ||
| Siemens | N/A | SIPROTEC 5 7SA87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 6MU85 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7UM85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SA86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7VE85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7KE85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) V20 toutes versions | ||
| Siemens | N/A | SIPROTEC 5 7UT86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SIPROTEC 5 7SS85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SICORE Base system toutes versions pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | SICAM GridPass versions antérieures à V2.50 | ||
| Siemens | N/A | SIPROTEC 5 6MD89 (CP300) V9.6 versions antérieures à V9.68 | ||
| Siemens | N/A | SIPROTEC 5 6MD86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596 | ||
| Siemens | N/A | CPCI85 Central Processing/Communication toutes versions pour la vulnérabilité CVE-2024-3596 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIPROTEC 5 7SL87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SL86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SD86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SX85 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 6MD85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q100 family versions ant\u00e9rieures \u00e0 V2.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 6MD89 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7UT87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7VK87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) V17 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7ST85 (CP300) versions ant\u00e9rieures \u00e0 V9.68",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 6MD84 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) V18 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V5.0 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SJ86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SD87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q200 family toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SK85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7UT85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7VU85 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) V19 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V4.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC RS-828A toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54085",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SJ85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE LPE9403 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-40581, CVE-2025-40582 et CVE-2025-40583.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Desigo CC toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS neo V5.0 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7ST86 (CP300) versions ant\u00e9rieures \u00e0 V9.83",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE LPE9403 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-40572, CVE-2025-40573, CVE-2025-40574, CVE-2025-40575, CVE-2025-40576, CVE-2025-40577, CVE-2025-40578, CVE-2025-40579 et CVE-2025-40580.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SA87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 6MU85 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7UM85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SA86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7VE85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7KE85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) V20 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7UT86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 7SS85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICORE Base system toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM GridPass versions ant\u00e9rieures \u00e0 V2.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 6MD89 (CP300) V9.6 versions ant\u00e9rieures \u00e0 V9.68",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 6MD86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CPCI85 Central Processing/Communication toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40572"
},
{
"name": "CVE-2025-40577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40577"
},
{
"name": "CVE-2025-30175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30175"
},
{
"name": "CVE-2025-40582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40582"
},
{
"name": "CVE-2025-30176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30176"
},
{
"name": "CVE-2025-40574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40574"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-40581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40581"
},
{
"name": "CVE-2025-30174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30174"
},
{
"name": "CVE-2024-23815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23815"
},
{
"name": "CVE-2025-40576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40576"
},
{
"name": "CVE-2025-40578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40578"
},
{
"name": "CVE-2024-54085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54085"
},
{
"name": "CVE-2025-40575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40575"
},
{
"name": "CVE-2025-40566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40566"
},
{
"name": "CVE-2025-40580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40580"
},
{
"name": "CVE-2025-40573",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40573"
},
{
"name": "CVE-2025-40579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40579"
},
{
"name": "CVE-2025-40583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40583"
}
],
"initial_release_date": "2025-05-13T00:00:00",
"last_revision_date": "2025-05-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0397",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-523418",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-523418.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-446307",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-446307.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-339086",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-339086.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-614723",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-614723.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-794185",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-327438",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-327438.html"
}
]
}
CERTFR-2025-AVI-0925
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Belden. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Belden | Classic Switch Platform | Classic Switch Platform toutes versions | ||
| Belden | HiSecOS Firewall Platform | HiSecOS Firewall Platform toutes versions | ||
| Belden | macmon-NAC | macmon-NAC toutes versions | ||
| Belden | HiOS Switch Platform | HiOS Switch Platform toutes versions | ||
| Belden | Commutateurs administrables d'entreprise | Commutateurs administrables d'entreprise toutes versions | ||
| Belden | HiLCOS Wireless Platform | HiLCOS Wireless Platform versions antérieures à 10.34-RU8 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Classic Switch Platform toutes versions",
"product": {
"name": "Classic Switch Platform",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "HiSecOS Firewall Platform toutes versions",
"product": {
"name": "HiSecOS Firewall Platform",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "macmon-NAC toutes versions",
"product": {
"name": "macmon-NAC",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "HiOS Switch Platform toutes versions",
"product": {
"name": "HiOS Switch Platform",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "Commutateurs administrables d\u0027entreprise toutes versions",
"product": {
"name": "Commutateurs administrables d\u0027entreprise",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "HiLCOS Wireless Platform versions ant\u00e9rieures \u00e0 10.34-RU8",
"product": {
"name": "HiLCOS Wireless Platform",
"vendor": {
"name": "Belden",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
}
],
"initial_release_date": "2025-10-27T00:00:00",
"last_revision_date": "2025-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0925",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Belden. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Belden",
"vendor_advisories": [
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 Belden PSIRT-3_RADIUS_CVE-2024-3596",
"url": "https://assets.belden.com/m/7bb580a5aa03f5b0/original/PSIRT-3_RADIUS_CVE-2024-3596.pdf"
}
]
}
CERTFR-2025-AVI-0855
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 24.4 antérieures à 24.4R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 22.4R3-S8-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4 antérieures à 23.4R2-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S4-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 22.4R3-S8 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-S2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.4-EVO antérieures à 24.4R2-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R4 | ||
| Juniper Networks | Security Director | Security Director Policy Enforcer versions antérieures à 23.1R1 Hotpatch v3 | ||
| Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-S5-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2 antérieures à 23.2R2-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2 antérieures à 24.2R2-S1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 24.4 ant\u00e9rieures \u00e0 24.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-S8-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.4-EVO ant\u00e9rieures \u00e0 24.4R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R4",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 23.1R1 Hotpatch v3",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R4",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S5-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-44431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44431"
},
{
"name": "CVE-2021-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
},
{
"name": "CVE-2025-59993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59993"
},
{
"name": "CVE-2025-59997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59997"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2025-59995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59995"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-59986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59986"
},
{
"name": "CVE-2025-60009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60009"
},
{
"name": "CVE-2025-59989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59989"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2023-46103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46103"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2025-59999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59999"
},
{
"name": "CVE-2025-59994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59994"
},
{
"name": "CVE-2024-4076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4076"
},
{
"name": "CVE-2025-59967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59967"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47538"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2025-59991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59991"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2025-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26600"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2025-59982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59982"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2018-17247",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17247"
},
{
"name": "CVE-2025-60004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60004"
},
{
"name": "CVE-2023-51594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51594"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2023-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50229"
},
{
"name": "CVE-2025-59974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59974"
},
{
"name": "CVE-2025-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26598"
},
{
"name": "CVE-2018-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3824"
},
{
"name": "CVE-2024-40928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-59981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59981"
},
{
"name": "CVE-2023-31248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2025-59968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59968"
},
{
"name": "CVE-2023-51592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51592"
},
{
"name": "CVE-2025-59990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59990"
},
{
"name": "CVE-2021-22146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22146"
},
{
"name": "CVE-2025-59978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59978"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2025-59992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59992"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2025-60000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60000"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2024-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47607"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2023-45866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45866"
},
{
"name": "CVE-2023-27349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27349"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2015-5377",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5377"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-60001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60001"
},
{
"name": "CVE-2024-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5742"
},
{
"name": "CVE-2023-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50230"
},
{
"name": "CVE-2025-52960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52960"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-59996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59996"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38575"
},
{
"name": "CVE-2024-35911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35911"
},
{
"name": "CVE-2025-59957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59957"
},
{
"name": "CVE-2025-59958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59958"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2018-17244",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17244"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-26597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26597"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2024-42934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42934"
},
{
"name": "CVE-2023-51580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51580"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
},
{
"name": "CVE-2023-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21102"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-59983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59983"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2025-60006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60006"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2015-1427",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1427"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-9632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9632"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2025-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26595"
},
{
"name": "CVE-2024-26868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26868"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2024-8235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8235"
},
{
"name": "CVE-2023-4147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4147"
},
{
"name": "CVE-2025-59977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59977"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3610"
},
{
"name": "CVE-2025-26596",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26596"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-48622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48622"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2025-59998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59998"
},
{
"name": "CVE-2024-26808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26808"
},
{
"name": "CVE-2024-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
},
{
"name": "CVE-2025-60002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60002"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2018-3831",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3831"
},
{
"name": "CVE-2023-43490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43490"
},
{
"name": "CVE-2025-59976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59976"
},
{
"name": "CVE-2025-59980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59980"
},
{
"name": "CVE-2025-26599",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26599"
},
{
"name": "CVE-2024-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47615"
},
{
"name": "CVE-2018-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3823"
},
{
"name": "CVE-2023-22655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22655"
},
{
"name": "CVE-2024-6126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6126"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-39368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39368"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2025-59975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59975"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2025-59987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59987"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2018-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3826"
},
{
"name": "CVE-2025-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26601"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2025-59985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59985"
},
{
"name": "CVE-2025-11198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11198"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-26327",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26327"
},
{
"name": "CVE-2015-3253",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3253"
},
{
"name": "CVE-2025-59964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59964"
},
{
"name": "CVE-2025-59988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59988"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2023-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45733"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2024-6655",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6655"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-27049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27049"
},
{
"name": "CVE-2025-59984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59984"
},
{
"name": "CVE-2025-52961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52961"
},
{
"name": "CVE-2023-51589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51589"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3903"
},
{
"name": "CVE-2024-35800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35800"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2023-51596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51596"
},
{
"name": "CVE-2025-60010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60010"
},
{
"name": "CVE-2023-51764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51764"
},
{
"name": "CVE-2025-26594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26594"
},
{
"name": "CVE-2024-6409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6409"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2025-59962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59962"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-10-09T00:00:00",
"last_revision_date": "2025-10-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0855",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103140",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103141",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103163",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-Multiple-OS-command-injection-vulnerabilities-fixed-CVE-2025-60006"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103168",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Device-allows-login-for-user-with-expired-password-CVE-2025-60010"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103171",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Reflected-client-side-HTTP-parameter-pollution-vulnerability-in-web-interface-CVE-2025-59977"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103167",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-When-a-user-with-the-name-ftp-or-anonymous-is-configured-unauthenticated-filesystem-access-is-allowed-CVE-2025-59980"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103156",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7024X-ACX7100-32C-ACX7100-48L-ACX7348-ACX7509-When-specific-valid-multicast-traffic-is-received-on-the-L3-interface-a-vulnerable-device-evo-pfemand-crashes-and-restarts-CVE-2025-59967"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103437",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Security-Director-Policy-Enforcer-An-unrestricted-API-allows-a-network-based-unauthenticated-attacker-to-deploy-malicious-vSRX-images-to-VMWare-NSX-Server-CVE-2025-11198"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103172",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Flooding-device-with-inbound-API-calls-leads-to-WebUI-and-CLI-management-access-DoS-CVE-2025-59975"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103157",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-sensitive-resources-in-web-interface-CVE-2025-59968"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103170",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Arbitrary-file-download-vulnerability-in-web-interface-CVE-2025-59976"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103139",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103151",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-sharding-enabled-change-in-indirect-next-hop-can-cause-RPD-crash-CVE-2025-59962"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103153",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX4700-When-forwarding-options-sampling-is-enabled-any-traffic-destined-to-the-RE-will-cause-the-forwarding-line-card-to-crash-and-restart-CVE-2025-59964"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103147",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-When-firewall-filter-rejects-traffic-these-packets-are-erroneously-sent-to-the-RE-CVE-2025-59958"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103144",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-except-PTX10003-An-unauthenticated-adjacent-attacker-sending-specific-valid-traffic-can-cause-a-memory-leak-in-cfmman-leading-to-FPC-crash-and-restart-CVE-2025-52961"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103143",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103146",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-An-attacker-with-physical-access-can-open-a-persistent-backdoor-CVE-2025-59957"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103138",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103165",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-BGP-EVPN-update-message-causes-rpd-crash-CVE-2025-60004"
}
]
}
CERTFR-2024-AVI-0942
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Broadcom. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Broadcom | Management Center - VA | Management Center - VA versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S500 | SG-S500 versions antérieures à 7.4.7.1 | ||
| Broadcom | SSL Visibility Appliance Software | SSL Visibility Appliance Software versions antérieures à 7.4.7.1 | ||
| Broadcom | SSP-S410 | SSP-S410 versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-3800 | SV-3800 versions antérieures à 7.4.7.1 | ||
| Broadcom | ProxySG Software - SGOS | ProxySG Software - SGOS versions antérieures à 7.3.23.1 | ||
| Broadcom | CAS-S400 | CAS-S400 versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S400-RP | SG-S400-RP versions antérieures à 7.3.23.1 | ||
| Broadcom | SV-S550 | SV-550 versions antérieures à 7.4.7.1 | ||
| Broadcom | SG-S200-40 | SG-S200-40 versions antérieures à 7.4.7.1 | ||
| Broadcom | ProxySG Software - SGOS | ProxySG Software - SGOS versions antérieures à 7.4.7.1 | ||
| Broadcom | ASG-S500 | ASG-S500 versions antérieures à 7.3.23.1 | ||
| Broadcom | ASG-S200 | ASG-S200 versions antérieures à 7.3.23.1 | ||
| Broadcom | Content Analysis Software | Content Analysis Software versions antérieures à 7.4.7.1 | ||
| Broadcom | ISG Content Analysis | ISG Content Analysis versions antérieures à 7.4.7.1 | ||
| Broadcom | Management Center | Management Center versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-2800 | SV-2800 versions antérieures à 7.3.23.1 | ||
| Broadcom | Reporter | Reporter versions antérieures à 7.4.7.1 | ||
| Broadcom | ASG-S500 | ASG-S500 versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-1800 | SV-1800 versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-3800 | SV-3800 versions antérieures à 7.3.23.1 | ||
| Broadcom | ASG-S400 | ASG-S400 versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-1800 | SV-1800 versions antérieures à 7.3.23.1 | ||
| Broadcom | ISG Proxy | ISG Proxy versions antérieures à 7.3.23.1 | ||
| Broadcom | CAS-S500 | CAS-S500 versions antérieures à 7.3.23.1 | ||
| Broadcom | SV-800 | SV-800 versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S500-RP | SG-S500-RP versions antérieures à 7.3.23.1 | ||
| Broadcom | ISG Proxy | ISG Proxy versions antérieures à 7.4.7.1 | ||
| Broadcom | ISG Content Analysis | ISG Content Analysis versions antérieures à 7.3.23.1 | ||
| Broadcom | SSP-S410 PLATFORM | SSP-S410 PLATFORM versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-S550 | SV-550 versions antérieures à 7.3.23.1 | ||
| Broadcom | SV-2800 | SV-2800 versions antérieures à 7.4.7.1 | ||
| Broadcom | SSP | SSP versions antérieures à 7.3.23.1 | ||
| Broadcom | Reporter-VA | Reporter-VA versions antérieures à 7.4.7.1 | ||
| Broadcom | Management Center | Management Center versions antérieures à 7.3.23.1 | ||
| Broadcom | CAS-S200 | CAS-S200 versions antérieures à 7.3.23.1 | ||
| Broadcom | SSP-S210 PLATFORM | SSP-S210 PLATFORM versions antérieures à 7.3.23.1 | ||
| Broadcom | CAS-S200 | CAS-S200 versions antérieures à 7.4.7.1 | ||
| Broadcom | CAS-S400 | CAS-S400 versions antérieures à 7.4.7.1 | ||
| Broadcom | Management Center - VA | Management Center - VA versions antérieures à 7.4.7.1 | ||
| Broadcom | SG-S200-RP | SG-S200-RP versions antérieures à 7.4.7.1 | ||
| Broadcom | Reporter-VA | Reporter-VA versions antérieures à 7.3.23.1 | ||
| Broadcom | SSP-S410 | SSP-S410 versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S400-RP | SG-S400-RP versions antérieures à 7.4.7.1 | ||
| Broadcom | SSP-S210 PLATFORM | SSP-S210 PLATFORM versions antérieures à 7.4.7.1 | ||
| Broadcom | Reporter-S500 | Reporter-S500 versions antérieures à 7.4.7.1 | ||
| Broadcom | ASG-S400 | ASG-S400 versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S200 | SG-S200 versions antérieures à 7.4.7.1 | ||
| Broadcom | ASG-S200 | ASG-S200 versions antérieures à 7.4.7.1 | ||
| Broadcom | MC-S400-20 | MC-S400-20 versions antérieures à 7.4.7.1 | ||
| Broadcom | SG-S200-40 | SG-S200-40 versions antérieures à 7.3.23.1 | ||
| Broadcom | SSP | SSP versions antérieures à 7.4.7.1 | ||
| Broadcom | SG-S500-RP | SG-S500-RP versions antérieures à 7.4.7.1 | ||
| Broadcom | SV-800 | SV-800 versions antérieures à 7.4.7.1 | ||
| Broadcom | Reporter-S500 | Reporter-S500 versions antérieures à 7.3.23.1 | ||
| Broadcom | SSL Visibility Appliance Software | SSL Visibility Appliance Software versions antérieures à 7.3.23.1 | ||
| Broadcom | CAS-S200-A1 | CAS-S200-A1 versions antérieures à 7.4.7.1 | ||
| Broadcom | Reporter | Reporter versions antérieures à 7.3.23.1 | ||
| Broadcom | CAS-S500 | CAS-S500 versions antérieures à 7.4.7.1 | ||
| Broadcom | SSP-S410 PLATFORM | SSP-S410 PLATFORM versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S400 | SG-S400 versions antérieures à 7.4.7.1 | ||
| Broadcom | CAS-S200-A1 | CAS-S200-A1 versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S500 | SG-S500 versions antérieures à 7.3.23.1 | ||
| Broadcom | MC-S400-20 | MC-S400-20 versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S200 | SG-S200 versions antérieures à 7.3.23.1 | ||
| Broadcom | Content Analysis Software | Content Analysis Software versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S200-RP | SG-S200-RP versions antérieures à 7.3.23.1 | ||
| Broadcom | SG-S400 | SG-S400 versions antérieures à 7.3.23.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Management Center - VA versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "Management Center - VA",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSL Visibility Appliance Software versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SSL Visibility Appliance Software",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP-S410 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SSP-S410",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-3800 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SV-3800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ProxySG Software - SGOS versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "ProxySG Software - SGOS",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S400 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "CAS-S400",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S400-RP versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S400-RP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-550 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SV-S550",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S200-40 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S200-40",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ProxySG Software - SGOS versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "ProxySG Software - SGOS",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ASG-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "ASG-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ASG-S200 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "ASG-S200",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Content Analysis Software versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "Content Analysis Software",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ISG Content Analysis versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "ISG Content Analysis",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Management Center versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "Management Center",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-2800 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SV-2800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "Reporter",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ASG-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "ASG-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-1800 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SV-1800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-3800 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SV-3800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ASG-S400 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "ASG-S400",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-1800 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SV-1800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ISG Proxy versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "ISG Proxy",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "CAS-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-800 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SV-800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S500-RP versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S500-RP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ISG Proxy versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "ISG Proxy",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ISG Content Analysis versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "ISG Content Analysis",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP-S410 PLATFORM versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SSP-S410 PLATFORM",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-550 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SV-S550",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-2800 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SV-2800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SSP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter-VA versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "Reporter-VA",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Management Center versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "Management Center",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S200 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "CAS-S200",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP-S210 PLATFORM versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SSP-S210 PLATFORM",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S200 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "CAS-S200",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S400 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "CAS-S400",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Management Center - VA versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "Management Center - VA",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S200-RP versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S200-RP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter-VA versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "Reporter-VA",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP-S410 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SSP-S410",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S400-RP versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S400-RP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP-S210 PLATFORM versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SSP-S210 PLATFORM",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "Reporter-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ASG-S400 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "ASG-S400",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S200 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S200",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "ASG-S200 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "ASG-S200",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "MC-S400-20 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "MC-S400-20",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S200-40 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S200-40",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SSP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S500-RP versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S500-RP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SV-800 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SV-800",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "Reporter-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSL Visibility Appliance Software versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SSL Visibility Appliance Software",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S200-A1 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "CAS-S200-A1",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "Reporter",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "CAS-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSP-S410 PLATFORM versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SSP-S410 PLATFORM",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S400 versions ant\u00e9rieures \u00e0 7.4.7.1",
"product": {
"name": "SG-S400",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS-S200-A1 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "CAS-S200-A1",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S500",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "MC-S400-20 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "MC-S400-20",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S200 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S200",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Content Analysis Software versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "Content Analysis Software",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S200-RP versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S200-RP",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SG-S400 versions ant\u00e9rieures \u00e0 7.3.23.1",
"product": {
"name": "SG-S400",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
}
],
"initial_release_date": "2024-11-04T00:00:00",
"last_revision_date": "2024-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0942",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Broadcom. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Broadcom",
"vendor_advisories": [
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 Broadcom 25157",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25157"
}
]
}
CERTFR-2025-AVI-0283
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu Greenplum. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Platform Extension Framework versions antérieures à 6.11.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.29.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Platform Extension Framework versions ant\u00e9rieures \u00e0 6.11.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.29.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3792"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2018-1282",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1282"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
}
],
"initial_release_date": "2025-04-08T00:00:00",
"last_revision_date": "2025-04-10T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0283",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-08T00:00:00.000000"
},
{
"description": "Correction d\u0027une erreur dans le r\u00e9sum\u00e9",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu Greenplum. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu Greenplum",
"vendor_advisories": [
{
"published_at": "2025-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25580",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25580"
},
{
"published_at": "2025-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25581",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25581"
}
]
}
CERTFR-2024-AVI-0637
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans HPE Aruba Networking ClearPass Policy Manager. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| HPE Aruba Networking | ClearPass Policy Manager | ClearPass Policy Manager versions 6.11.x antérieures à 6.11.9 | ||
| HPE Aruba Networking | ClearPass Policy Manager | ClearPass Policy Manager versions 6.12.x antérieures à 6.12.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ClearPass Policy Manager versions 6.11.x ant\u00e9rieures \u00e0 6.11.9",
"product": {
"name": "ClearPass Policy Manager",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "ClearPass Policy Manager versions 6.12.x ant\u00e9rieures \u00e0 6.12.2",
"product": {
"name": "ClearPass Policy Manager",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-41916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41916"
},
{
"name": "CVE-2024-41915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41915"
},
{
"name": "CVE-2024-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5486"
}
],
"initial_release_date": "2024-07-31T00:00:00",
"last_revision_date": "2024-07-31T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0637",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans HPE Aruba Networking ClearPass Policy Manager. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HPE Aruba Networking ClearPass Policy Manager ",
"vendor_advisories": [
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 HPE Aruba Networking hpesbnw04675",
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04675.txt"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2024-AVI-1081
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM.Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.11.0.0 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF02 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 4.8.x à 5.0.x antérieures à 5.1 | ||
| IBM | QRadar Incident Forensics | QRadar Incident Forensics 7.5.x antérieures à 7.5.0 UP10 IF02 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.11.0.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 4.8.x \u00e0 5.0.x ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF02",
"product": {
"name": "QRadar Incident Forensics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21536"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2023-31582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31582"
},
{
"name": "CVE-2023-23613",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23613"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-38998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38998"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2022-41917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41917"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2024-41755",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41755"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-38372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38372"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-38986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38986"
},
{
"name": "CVE-2022-41915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41915"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2024-52318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52318"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2023-33546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33546"
},
{
"name": "CVE-2024-41818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41818"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2024-52317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
},
{
"name": "CVE-2024-47175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47175"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2023-23612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23612"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2024-12-13T00:00:00",
"last_revision_date": "2024-12-13T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1081",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177766",
"url": "https://www.ibm.com/support/pages/node/7177766"
},
{
"published_at": "2024-12-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178224",
"url": "https://www.ibm.com/support/pages/node/7178224"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178556",
"url": "https://www.ibm.com/support/pages/node/7178556"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2024-AVI-0567
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que le correctif pour la vulnérabilité CVE-2024-3596 pour Prisma Access devrait être disponible le 30 Juillet 2024.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 11.1 antérieures à 11.1.4 | ||
| Palo Alto Networks | Expedition | Expedition versions 1.2 antérieures à 1.2.92 | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 10.1 antérieures à 10.1.9 sur Panorama | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 10.2 antérieures à 10.2.4 sur Panorama | ||
| Palo Alto Networks | Expedition | Script d'installation initSetup_v2.0 pour Expedition versions antérieures à la date 20240605 | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 10.2 antérieures à 10.2.10 | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 9.1 antérieures à 9.1.19 | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 11.0 antérieures à 11.0.5 | ||
| Palo Alto Networks | Cortex XDR Agent | Cortex XDR Agent versions 8.2 antérieures à 8.2.2 | ||
| Palo Alto Networks | Cortex XDR Agent | Cortex XDR Agent versions 7.9-CE antérieures à 7.9.102-CE | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 11.2 antérieures à 11.2.1 | ||
| Palo Alto Networks | GlobalProtect App | PAN-OS versions 10.1 antérieures à 10.1.14-h2 | ||
| Palo Alto Networks | Prisma Access | Prisma Access toutes versions |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PAN-OS versions 11.1 ant\u00e9rieures \u00e0 11.1.4",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Expedition versions 1.2 ant\u00e9rieures \u00e0 1.2.92",
"product": {
"name": "Expedition",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.1 ant\u00e9rieures \u00e0 10.1.9 sur Panorama",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2 ant\u00e9rieures \u00e0 10.2.4 sur Panorama",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Script d\u0027installation initSetup_v2.0 pour Expedition versions ant\u00e9rieures \u00e0 la date 20240605",
"product": {
"name": "Expedition",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2 ant\u00e9rieures \u00e0 10.2.10",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.1 ant\u00e9rieures \u00e0 9.1.19",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.0 ant\u00e9rieures \u00e0 11.0.5",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Cortex XDR Agent versions 8.2 ant\u00e9rieures \u00e0 8.2.2",
"product": {
"name": "Cortex XDR Agent",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Cortex XDR Agent versions 7.9-CE ant\u00e9rieures \u00e0 7.9.102-CE",
"product": {
"name": "Cortex XDR Agent",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2 ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.1 ant\u00e9rieures \u00e0 10.1.14-h2",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma Access toutes versions",
"product": {
"name": "Prisma Access",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur indique que le correctif pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596 pour Prisma Access devrait \u00eatre disponible le 30 Juillet 2024.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-5911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5911"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-5913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5913"
},
{
"name": "CVE-2024-5910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5910"
},
{
"name": "CVE-2024-5912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5912"
}
],
"initial_release_date": "2024-07-11T00:00:00",
"last_revision_date": "2024-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0567",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo Alto Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks",
"vendor_advisories": [
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5910",
"url": "https://security.paloaltonetworks.com/CVE-2024-5910"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-247511",
"url": "https://security.paloaltonetworks.com/CVE-2024-3596"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2024-0006",
"url": "https://security.paloaltonetworks.com/PAN-SA-2024-0006"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CPATR-22565",
"url": "https://security.paloaltonetworks.com/CVE-2024-5912"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5913",
"url": "https://security.paloaltonetworks.com/CVE-2024-5913"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-182835",
"url": "https://security.paloaltonetworks.com/CVE-2024-5911"
}
]
}
SSA-723487
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details incl. external references can be found in the chapter \"Additional Information\".\nSiemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter \"Additional Information\".\nSiemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter \"Additional Information\" for details.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723487.json"
}
],
"title": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products",
"tracking": {
"current_release_date": "2025-07-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-723487",
"initial_release_date": "2024-07-09T00:00:00Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-07-22T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Clarified that the fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants) in V4.1.8 only covers RADIUS client mitigation C1, but not C2"
},
{
"date": "2024-11-12T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for RUGGEDCOM CROSSBOW"
},
{
"date": "2024-12-10T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix (and related important recommendations in chapter Additional Information) for RUGGEDCOM ROS V4.x devices; Added additional SINEC OS-based devices as affected products: RUGGEDCOM RST2428P and SCALANCE XC-300, XR-300, XC-400 families, and additional devices in the SCALANCE XR-500 family"
},
{
"date": "2025-01-14T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for SCALANCE W-700 IEEE 802.11ax family and for SCALANCE M-800 family (incl. S615, MUM-800 and RM1224)"
},
{
"date": "2025-03-11T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants)"
},
{
"date": "2025-06-10T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Clarified that SINEC INS is only affected when the Relay feature is used; added fix for the RUGGEDCOM RST2428P, SCALANCE XC-300, SCALANCE XC-400 and SCALANCE XR-300 (6GK5334-xTSxx) families and for some of the devices in the SCALANCE XM-400/XR-500 and SCALANCE XCM-/XRM-/XCH-/XRH-300 families"
},
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added fix for SCALANCE XB-200/XC-200/XP-200/XF-200BA/XR-300WG family, for SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family (MSPS V1.3), for RUGGEDCOM ROS V5.X family and for SINEC INS (relay feature); Clarified the applicability of the MSPS V1.3 and the SINEC OS V3.2 fix releases for product families that support both"
}
],
"status": "interim",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.6",
"product": {
"name": "RUGGEDCOM CROSSBOW",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800NC",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801NC",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802NC",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803NC",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969NC",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100NC",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200NC",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30NC",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388 V4.X",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388 V5.X",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388NC V4.X",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388NC V5.X",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000RE",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1400",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1500",
"product_id": "27"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1501",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1510",
"product_id": "29"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1511",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1512",
"product_id": "31"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1524",
"product_id": "32"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1536",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX5000",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110NC",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400NC",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401NC",
"product_id": "40"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416",
"product_id": "41"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NC",
"product_id": "42"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NCv2 V4.X",
"product_id": "43"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416NCv2 V5.X",
"product_id": "44"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416P",
"product_id": "45"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNC",
"product_id": "46"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V4.X",
"product_id": "47"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V5.X",
"product_id": "48"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416Pv2 V4.X",
"product_id": "49"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416Pv2 V5.X",
"product_id": "50"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416v2 V4.X",
"product_id": "51"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416v2 V5.X",
"product_id": "52"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900",
"product_id": "53"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900 (32M) V4.X",
"product_id": "54"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900 (32M) V5.X",
"product_id": "55"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G",
"product_id": "56"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G (32M) V4.X",
"product_id": "57"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900G (32M) V5.X",
"product_id": "58"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC",
"product_id": "59"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V4.X",
"product_id": "60"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V5.X",
"product_id": "61"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GP",
"product_id": "62"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GPNC",
"product_id": "63"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GPNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900L",
"product_id": "64"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900LNC",
"product_id": "65"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-C01",
"product_id": "66"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-XX",
"product_id": "67"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-C01",
"product_id": "68"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-XX",
"product_id": "69"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-C01",
"product_id": "70"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-XX",
"product_id": "71"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX",
"product_id": "72"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX-C01",
"product_id": "73"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC",
"product_id": "74"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V4.X",
"product_id": "75"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V5.X",
"product_id": "76"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900W",
"product_id": "77"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910",
"product_id": "78"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910L",
"product_id": "79"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910LNC",
"product_id": "80"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910NC",
"product_id": "81"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910W",
"product_id": "82"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920L",
"product_id": "83"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920LNC",
"product_id": "84"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920W",
"product_id": "85"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930L",
"product_id": "86"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930LNC",
"product_id": "87"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930W",
"product_id": "88"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940G",
"product_id": "89"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940GNC",
"product_id": "90"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969",
"product_id": "91"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969NC",
"product_id": "92"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600",
"product_id": "93"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600F",
"product_id": "94"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600FNC",
"product_id": "95"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600FNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600NC",
"product_id": "96"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600T",
"product_id": "97"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600TNC",
"product_id": "98"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000",
"product_id": "99"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000A",
"product_id": "100"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000ANC",
"product_id": "101"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000ANC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000H",
"product_id": "102"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000HNC",
"product_id": "103"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000HNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000NC",
"product_id": "104"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000T",
"product_id": "105"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000TNC",
"product_id": "106"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG907R",
"product_id": "107"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG908C",
"product_id": "108"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG909R",
"product_id": "109"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG910C",
"product_id": "110"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920P V4.X",
"product_id": "111"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920P V5.X",
"product_id": "112"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920PNC V4.X",
"product_id": "113"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920PNC V5.X",
"product_id": "114"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100",
"product_id": "115"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V4.X",
"product_id": "116"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V5.X",
"product_id": "117"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC",
"product_id": "118"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V4.X",
"product_id": "119"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"product_id": "120"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P",
"product_id": "121"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V4.X",
"product_id": "122"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V5.X",
"product_id": "123"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC",
"product_id": "124"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X",
"product_id": "125"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"product_id": "126"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200",
"product_id": "127"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200NC",
"product_id": "128"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288 V4.X",
"product_id": "129"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288 V5.X",
"product_id": "130"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288NC V4.X",
"product_id": "131"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288NC V5.X",
"product_id": "132"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300 V4.X",
"product_id": "133"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300 V5.X",
"product_id": "134"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300NC V4.X",
"product_id": "135"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300NC V5.X",
"product_id": "136"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300P V4.X",
"product_id": "137"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300P V5.X",
"product_id": "138"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300PNC V4.X",
"product_id": "139"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300PNC V5.X",
"product_id": "140"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488 V4.X",
"product_id": "141"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488 V5.X",
"product_id": "142"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488NC V4.X",
"product_id": "143"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488NC V5.X",
"product_id": "144"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910",
"product_id": "145"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910NC",
"product_id": "146"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916C",
"product_id": "147"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916P",
"product_id": "148"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228",
"product_id": "149"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228P",
"product_id": "150"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "151",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "152",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)",
"product_id": "153",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)",
"product_id": "154",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)",
"product_id": "155",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)",
"product_id": "156",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "157",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "158",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)",
"product_id": "159",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2FA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "160",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)",
"product_id": "161",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "162",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "163",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "164",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "165",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)",
"product_id": "166",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)",
"product_id": "167",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "168",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)",
"product_id": "169",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)",
"product_id": "170",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)",
"product_id": "171",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3FA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "172",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "173",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)",
"product_id": "174",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)",
"product_id": "175",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)",
"product_id": "176",
"product_identification_helper": {
"model_numbers": [
"6GK5622-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)",
"product_id": "177",
"product_identification_helper": {
"model_numbers": [
"6GK5626-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)",
"product_id": "178",
"product_identification_helper": {
"model_numbers": [
"6GK5632-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)",
"product_id": "179",
"product_identification_helper": {
"model_numbers": [
"6GK5636-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)",
"product_id": "180",
"product_identification_helper": {
"model_numbers": [
"6GK5642-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)",
"product_id": "181",
"product_identification_helper": {
"model_numbers": [
"6GK5646-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)",
"product_id": "182",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)",
"product_id": "183",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)",
"product_id": "184",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)",
"product_id": "185",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)",
"product_id": "186",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)",
"product_id": "187",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)",
"product_id": "188",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)",
"product_id": "189",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)",
"product_id": "190",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)",
"product_id": "191",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)",
"product_id": "192",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)",
"product_id": "193",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)",
"product_id": "194",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)",
"product_id": "195",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)",
"product_id": "196",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)",
"product_id": "197",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)",
"product_id": "198",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)",
"product_id": "199",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)",
"product_id": "200",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)",
"product_id": "201",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)",
"product_id": "202",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)",
"product_id": "203",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)",
"product_id": "204",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)",
"product_id": "205",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)",
"product_id": "206",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)",
"product_id": "207",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)",
"product_id": "208",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)",
"product_id": "209",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)",
"product_id": "210",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)",
"product_id": "211",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)",
"product_id": "212",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)",
"product_id": "213",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)",
"product_id": "214",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)",
"product_id": "215",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)",
"product_id": "216",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)",
"product_id": "217",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)",
"product_id": "218",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)",
"product_id": "219",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)",
"product_id": "220",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)",
"product_id": "221",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)",
"product_id": "222",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)",
"product_id": "223",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)",
"product_id": "224",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)",
"product_id": "225",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)",
"product_id": "226",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)",
"product_id": "227",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)",
"product_id": "228",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)",
"product_id": "229",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)",
"product_id": "230",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "231",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "232",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "233",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "234",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "235",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "236",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)",
"product_id": "237",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-6AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "238",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)",
"product_id": "239",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)",
"product_id": "240",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)",
"product_id": "241",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)",
"product_id": "242",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "243",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)",
"product_id": "244",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)",
"product_id": "245",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "246",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)",
"product_id": "247",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)",
"product_id": "248",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-2AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "249",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "250",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)",
"product_id": "251",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)",
"product_id": "252",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)",
"product_id": "253",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)",
"product_id": "254",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)",
"product_id": "255",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)",
"product_id": "256",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)",
"product_id": "257",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)",
"product_id": "258",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)",
"product_id": "259",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)",
"product_id": "260",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)",
"product_id": "261",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)",
"product_id": "262",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)",
"product_id": "263",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)",
"product_id": "264",
"product_identification_helper": {
"model_numbers": [
"6GK5304-2BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)",
"product_id": "265",
"product_identification_helper": {
"model_numbers": [
"6GK5306-1BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)",
"product_id": "266",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)",
"product_id": "267",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)",
"product_id": "268",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)",
"product_id": "269",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)",
"product_id": "270",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)",
"product_id": "271",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)",
"product_id": "272",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)",
"product_id": "273",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)",
"product_id": "274",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)",
"product_id": "275",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)",
"product_id": "276",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)",
"product_id": "277",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)",
"product_id": "278",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)",
"product_id": "279",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)",
"product_id": "280",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)",
"product_id": "281",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)",
"product_id": "282",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)",
"product_id": "283",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)",
"product_id": "284",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)",
"product_id": "285",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)",
"product_id": "286",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)",
"product_id": "287",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)",
"product_id": "288",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)",
"product_id": "289",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)",
"product_id": "290",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)",
"product_id": "291",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)",
"product_id": "292",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)",
"product_id": "293",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)",
"product_id": "294",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)",
"product_id": "295",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)",
"product_id": "296",
"product_identification_helper": {
"model_numbers": [
"6GK5320-1BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)",
"product_id": "297",
"product_identification_helper": {
"model_numbers": [
"6GK5320-3BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)",
"product_id": "298",
"product_identification_helper": {
"model_numbers": [
"6GK5408-2FD00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)",
"product_id": "299",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)",
"product_id": "300",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)",
"product_id": "301",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)",
"product_id": "302",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)",
"product_id": "303",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)",
"product_id": "304",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)",
"product_id": "305",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)",
"product_id": "306",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)",
"product_id": "307",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)",
"product_id": "308",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)",
"product_id": "309",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)",
"product_id": "310",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)",
"product_id": "311",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)",
"product_id": "312",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)",
"product_id": "313",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)",
"product_id": "314",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)",
"product_id": "315",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)",
"product_id": "316",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)",
"product_id": "317",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)",
"product_id": "318",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)",
"product_id": "319",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)",
"product_id": "320",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)",
"product_id": "321",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)",
"product_id": "322",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)",
"product_id": "323",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)",
"product_id": "324",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)",
"product_id": "325",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)",
"product_id": "326",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)",
"product_id": "327",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)",
"product_id": "328",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)",
"product_id": "329",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)",
"product_id": "330",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)",
"product_id": "331",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)",
"product_id": "332",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)",
"product_id": "333",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)",
"product_id": "334",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)",
"product_id": "335",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)",
"product_id": "336",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)",
"product_id": "337",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)",
"product_id": "338",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)",
"product_id": "339",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)",
"product_id": "340",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)",
"product_id": "341",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)",
"product_id": "342",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)",
"product_id": "343",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)",
"product_id": "344",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)",
"product_id": "345",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)",
"product_id": "346",
"product_identification_helper": {
"model_numbers": [
"6GK5224-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)",
"product_id": "347",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)",
"product_id": "348",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)",
"product_id": "349",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)",
"product_id": "350",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)",
"product_id": "351",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)",
"product_id": "352",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)",
"product_id": "353",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)",
"product_id": "354",
"product_identification_helper": {
"model_numbers": [
"6GK5424-8TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)",
"product_id": "355",
"product_identification_helper": {
"model_numbers": [
"6GK5428-4TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)",
"product_id": "356",
"product_identification_helper": {
"model_numbers": [
"6GK5432-0GR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)",
"product_id": "357",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)",
"product_id": "358",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)",
"product_id": "359",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)",
"product_id": "360",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)",
"product_id": "361",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)",
"product_id": "362",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)",
"product_id": "363",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)",
"product_id": "364",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)",
"product_id": "365",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0GA00-1UF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)",
"product_id": "366",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GP00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)",
"product_id": "367",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GQ00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)",
"product_id": "368",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)",
"product_id": "369",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)",
"product_id": "370",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)",
"product_id": "371",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)",
"product_id": "372",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)",
"product_id": "373",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)",
"product_id": "374",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)",
"product_id": "375",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)",
"product_id": "376",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)",
"product_id": "377",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)",
"product_id": "378",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)",
"product_id": "379",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)",
"product_id": "380",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0JA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)",
"product_id": "381",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)",
"product_id": "382",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)",
"product_id": "383",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)",
"product_id": "384",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)",
"product_id": "385",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)",
"product_id": "386",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)",
"product_id": "387",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)",
"product_id": "388",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)",
"product_id": "389",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)",
"product_id": "390",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)",
"product_id": "391",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)",
"product_id": "392",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)",
"product_id": "393",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)",
"product_id": "394",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)",
"product_id": "395",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)",
"product_id": "396",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)",
"product_id": "397",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)",
"product_id": "398",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)",
"product_id": "399",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)",
"product_id": "400",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)",
"product_id": "401",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)",
"product_id": "402",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)",
"product_id": "403",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)",
"product_id": "404",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)",
"product_id": "405",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)",
"product_id": "406",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)",
"product_id": "407",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)",
"product_id": "408",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)",
"product_id": "409",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)",
"product_id": "410",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)",
"product_id": "411",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)",
"product_id": "412",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)",
"product_id": "413",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)",
"product_id": "414",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)",
"product_id": "415",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)",
"product_id": "416",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)",
"product_id": "417",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)",
"product_id": "418",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)",
"product_id": "419",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)",
"product_id": "420",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)",
"product_id": "421",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)",
"product_id": "422",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)",
"product_id": "423",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)",
"product_id": "424",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)",
"product_id": "425",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)",
"product_id": "426",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)",
"product_id": "427",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)",
"product_id": "428",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)",
"product_id": "429",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)",
"product_id": "430",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)",
"product_id": "431",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)",
"product_id": "432",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)",
"product_id": "433",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)",
"product_id": "434",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)",
"product_id": "435",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)",
"product_id": "436",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)",
"product_id": "437",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)",
"product_id": "438",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)",
"product_id": "439",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)",
"product_id": "440",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)",
"product_id": "441",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)",
"product_id": "442",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)",
"product_id": "443",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)",
"product_id": "444",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)",
"product_id": "445",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)",
"product_id": "446",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)",
"product_id": "447",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)",
"product_id": "448",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)",
"product_id": "449",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)",
"product_id": "450",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)",
"product_id": "451",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)",
"product_id": "452",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)",
"product_id": "453",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)",
"product_id": "454",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)",
"product_id": "455",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)",
"product_id": "456",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)",
"product_id": "457",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)",
"product_id": "458",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)",
"product_id": "459",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)",
"product_id": "460",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)",
"product_id": "461",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)",
"product_id": "462",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)",
"product_id": "463",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)",
"product_id": "464",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)",
"product_id": "465",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)",
"product_id": "466",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)",
"product_id": "467",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)",
"product_id": "468",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)",
"product_id": "469",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)",
"product_id": "470",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)",
"product_id": "471",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)",
"product_id": "472",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)",
"product_id": "473",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)",
"product_id": "474",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)",
"product_id": "475",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)",
"product_id": "476",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)",
"product_id": "477",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)",
"product_id": "478",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)",
"product_id": "479",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)",
"product_id": "480",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)",
"product_id": "481",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)",
"product_id": "482",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)",
"product_id": "483",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)",
"product_id": "484",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)",
"product_id": "485",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)",
"product_id": "486",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)",
"product_id": "487",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)",
"product_id": "488",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)",
"product_id": "489",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)",
"product_id": "490",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)",
"product_id": "491",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V1.0 SP2 Update 4 only when the Relay feature is enabled",
"product": {
"name": "SINEC INS",
"product_id": "492"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)",
"product_id": "493",
"product_identification_helper": {
"model_numbers": [
"6AG1308-2FL10-4AA3"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)",
"product_id": "494",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BB00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)",
"product_id": "495",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)",
"product_id": "496",
"product_identification_helper": {
"model_numbers": [
"6AG1208-0BA00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)",
"product_id": "497",
"product_identification_helper": {
"model_numbers": [
"6AG1216-4BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"366",
"367",
"368",
"369",
"370",
"371",
"455",
"456",
"457",
"458",
"459",
"460",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP2 Update 4 or later version",
"product_ids": [
"492"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.3 or later version",
"product_ids": [
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"393",
"394",
"395",
"396",
"397",
"398",
"439",
"440",
"441",
"442",
"449",
"450",
"451",
"452",
"453",
"454",
"461",
"462",
"463",
"464",
"465",
"466",
"467"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977441/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977720/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"151",
"357",
"358",
"359",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"360"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1.9 or later version",
"product_ids": [
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"493"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109982245/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"2",
"3",
"4",
"6",
"8",
"10",
"12",
"14",
"18",
"20",
"22",
"35",
"37",
"39",
"41",
"49",
"51",
"53",
"54",
"56",
"57",
"62",
"64",
"77",
"78",
"79",
"82",
"83",
"85",
"86",
"88",
"89",
"91",
"93",
"94",
"97",
"99",
"100",
"102",
"105",
"111",
"115",
"116",
"119",
"121",
"122",
"127",
"129",
"133",
"137",
"141"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"5",
"7",
"9",
"11",
"13",
"15",
"19",
"36",
"38",
"40",
"42",
"43",
"45",
"46",
"47",
"59",
"60",
"63",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"80",
"81",
"84",
"87",
"90",
"92",
"95",
"96",
"98",
"101",
"103",
"104",
"106",
"113",
"118",
"124",
"125",
"128",
"131",
"135",
"139",
"143"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.6 or later version",
"product_ids": [
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"361",
"362",
"363",
"364",
"365",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"435",
"436",
"437",
"438",
"443",
"444",
"445",
"446",
"447",
"448",
"494",
"495",
"496",
"497"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977185/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"21",
"50",
"52",
"55",
"58",
"107",
"108",
"109",
"110",
"112",
"117",
"123",
"130",
"134",
"138",
"142",
"145",
"147",
"148",
"149",
"150"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"23",
"44",
"48",
"61",
"76",
"114",
"120",
"126",
"132",
"136",
"140",
"144",
"146"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.6 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976555/"
},
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"16",
"17",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
}
],
"title": "CVE-2024-3596"
}
]
}
ssa-770770
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Fortinet has published information on vulnerabilities in FortiOS. This advisory lists the related Siemens Industrial products.\n\nSiemens has released a new version for RUGGEDCOM APE1808 and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770770.html"
},
{
"category": "self",
"summary": "SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770770.json"
}
],
"title": "SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices",
"tracking": {
"current_release_date": "2025-11-11T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-770770",
"initial_release_date": "2025-02-11T00:00:00Z",
"revision_history": [
{
"date": "2025-02-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-03-11T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added newly published upstream vulnerabilities CVE-2024-35279 and CVE-2024-40591"
},
{
"date": "2025-04-08T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added newly published upstream vulnerabilities CVE-2024-48886, CVE-2024-50563, CVE-2024-45324 and CVE-2024-3596"
},
{
"date": "2025-05-13T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added newly published upstream vulnerabilities CVE-2024-21762, CVE-2022-42475, CVE-2023-27997, CVE-2024-26013 and CVE-2024-50565. Moved CVE-2024-52963 to SSA-864900"
},
{
"date": "2025-06-10T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added newly published upstream vulnerability CVE-2025-22252"
},
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added newly published upstream vulnerabilities CVE-2025-22254 and CVE-2025-22251"
},
{
"date": "2025-08-12T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added newly published upstream vulnerability CVE-2024-52965"
},
{
"date": "2025-11-11T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added newly published upstream vulnerabilities CVE-2024-50571, CVE-2025-22258, CVE-2024-47569, CVE-2025-25252 and CVE-2025-58325"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-42475",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow vulnerability [CWE-122]\u00a0in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2022-42475"
},
{
"cve": "CVE-2023-27997",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2023-27997"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Use RADIUS over TLS (aka RADSEC) (https://fortiguard.fortinet.com/psirt/FG-IR-24-255)",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"4"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-21762",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-21762"
},
{
"cve": "CVE-2024-26013",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2 before 6.4.8 and Fortinet FortiWeb before 7.4.2 may allow an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-26013"
},
{
"cve": "CVE-2024-35279",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A stack-based buffer overflow vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "For each interface, remove the fabric service or block CAPWAP-CONTROL access to port 5246 through a local-in policy (see https://fortiguard.fortinet.com/psirt/FG-IR-24-160)",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-35279"
},
{
"cve": "CVE-2024-36504",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability [CWE-125] in FortiOS SSLVPN web portal versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, 7.0 all verisons, and 6.4 all versions may allow an authenticated attacker to perform a denial of service on the SSLVPN web portal via a specially crafted URL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-36504"
},
{
"cve": "CVE-2024-40591",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "summary",
"text": "An incorrect privilege assignment vulnerability in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-40591"
},
{
"cve": "CVE-2024-45324",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"notes": [
{
"category": "summary",
"text": "A use of externally-controlled format string vulnerability in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-45324"
},
{
"cve": "CVE-2024-46665",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "summary",
"text": "An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46665"
},
{
"cve": "CVE-2024-46666",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "An allocation of resources without limits or throttling [CWE-770] vulnerability in FortiOS versions 7.6.0, versions 7.4.4 through 7.4.0, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow a remote unauthenticated attacker to prevent access to the GUI via specially crafted requests directed at specific endpoints.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46666"
},
{
"cve": "CVE-2024-46668",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiOS versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, versions 7.0.0 through 7.0.15, and versions 6.4.0 through 6.4.15 may allow an unauthenticated remote user to consume all system memory via multiple large file uploads.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46668"
},
{
"cve": "CVE-2024-46669",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An\u00a0Integer Overflow or Wraparound vulnerability in version 7.4.4 and below, version 7.2.10 and below; FortiSASE version 23.4.b FortiOS tenant IPsec IKE service may allow an authenticated attacker to crash the IPsec tunnel via crafted requests, resulting in potential denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46669"
},
{
"cve": "CVE-2024-46670",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An\u00a0Out-of-bounds Read vulnerability in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-46670"
},
{
"cve": "CVE-2024-47569",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "summary",
"text": "A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-47569"
},
{
"cve": "CVE-2024-48884",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A improper limitation of a pathname to a restricted directory (\u0027path traversal\u0027) in Fortinet FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiOS versions 7.6.0, 7.4.0 through 7.4.4, 7.2.5 through 7.2.9, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy 7.4.0 through 7.4.5, 7.2.0 through 7.2.11, 7.0.0 through 7.0.18, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to trigger an escalation of privilege via specially crafted packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-48884"
},
{
"cve": "CVE-2024-48885",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A improper limitation of a pathname to a restricted directory (\u0027path traversal\u0027) in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-48885"
},
{
"cve": "CVE-2024-48886",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "summary",
"text": "A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-48886"
},
{
"cve": "CVE-2024-50563",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "summary",
"text": "A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50563"
},
{
"cve": "CVE-2024-50565",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "summary",
"text": "A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-50565"
},
{
"cve": "CVE-2024-50571",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow in Fortinet FortiOS 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, FortiManager Cloud 7.6.2, 7.4.1 through 7.4.5, 7.2.1 through 7.2.8, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7, FortiAnalyzer Cloud 7.4.1 through 7.4.5, 7.2.1 through 7.2.8, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7, FortiProxy 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.12, 7.0.0 through 7.0.19, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiAnalyzer 7.6.0 through 7.6.2, 7.4.0 through 7.4.5, 7.2.0 through 7.2.8, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, 6.2.0 through 6.2.13, 6.0.0 through 6.0.12, FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.9, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, 6.2.0 through 6.2.13, 6.0.0 through 6.0.12 allows attacker to execute unauthorized code or commands via specifically crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-50571"
},
{
"cve": "CVE-2024-52965",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "summary",
"text": "A missing critical step in authentication vulnerability [CWE-304] in Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and before 7.0.16 \u0026 FortiProxy version 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13 and before 7.0.20 allows an API-user using api-key + PKI user certificate authentication to login even if the certificate is invalid.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RC:C",
"version": "3.1"
},
"products": [
"4"
]
}
],
"title": "CVE-2024-52965"
},
{
"cve": "CVE-2024-54021",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An improper neutralization of crlf sequences in http headers (\u0027http response splitting\u0027) in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-54021"
},
{
"cve": "CVE-2025-22251",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:C",
"version": "3.1"
},
"products": [
"4"
]
}
],
"title": "CVE-2025-22251"
},
{
"cve": "CVE-2025-22252",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "A missing authentication for critical function vulnerability in FortiOS, FortiProxy, and FortiSwitchManager TACACS+ configured to use a remote TACACS+ server for authentication, that has itself been configured to use ASCII authentication may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Use alternate authentication mechanism such as PAP, MSCHAP, and CHAP configurations other than ASCII authentication (see https://www.fortiguard.com/psirt/FG-IR-24-472)",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"3"
]
}
],
"title": "CVE-2025-22252"
},
{
"cve": "CVE-2025-22254",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "An Improper Privilege Management vulnerability [CWE-269] affecting Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16 and before 6.4.15, FortiProxy version 7.6.0 through 7.6.1 and before 7.4.7 \u0026 FortiWeb version 7.6.0 through 7.6.1 and before 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to\u00a0Node.js websocket module.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"4"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:W/RC:C",
"version": "3.1"
},
"products": [
"4"
]
}
],
"title": "CVE-2025-22254"
},
{
"cve": "CVE-2025-22258",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow in Fortinet FortiSRA 1.5.0, 1.4.0 through 1.4.2, FortiPAM 1.5.0, 1.4.0 through 1.4.2, 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy 7.6.0 through 7.6.1, 7.4.0 through 7.4.7, FortiOS 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.2 through 7.0.16, FortiSwitchManager 7.2.1 through 7.2.5 allows attackers to escalate their privilege via specially crafted http requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2025-22258"
},
{
"cve": "CVE-2025-25252",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "summary",
"text": "An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2025-25252"
},
{
"cve": "CVE-2025-58325",
"cwe": {
"id": "CWE-684",
"name": "Incorrect Provision of Specified Functionality"
},
"notes": [
{
"category": "summary",
"text": "An Incorrect Provision of Specified Functionality vulnerability [CWE-684] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2.5 through 7.2.10, 7.0.0 through 7.0.15, 6.4 all versions may allow a local authenticated attacker to execute system commands via crafted CLI commands.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2025-58325"
}
]
}
ssa-364175
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] \nhttps://security.paloaltonetworks.com/",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-364175.html"
},
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-364175.json"
}
],
"title": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1",
"tracking": {
"current_release_date": "2025-07-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-364175",
"initial_release_date": "2024-07-09T00:00:00Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-08-13T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added newly published CVE-2024-5913 and CVE-2024-3596"
},
{
"date": "2024-10-08T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-48795, CVE-2024-3596, CVE-2024-5913 and fix version information for Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices"
},
{
"date": "2024-11-12T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added newly published CVE-2024-9468 and CVE-2024-9471. Added CVSSv4.0 vector to CVE-2024-5913"
},
{
"date": "2024-12-10T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added newly published CVE-2024-5920"
},
{
"date": "2025-04-08T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added newly published CVE-2025-0114"
},
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added newly published CVE-2025-4231"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-5913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-5913"
},
{
"cve": "CVE-2024-5920",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator\u0027s browser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-5920"
},
{
"cve": "CVE-2024-9468",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-9468"
},
{
"cve": "CVE-2024-9471",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-9471"
},
{
"cve": "CVE-2025-0114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"3"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"3"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"3"
]
}
],
"title": "CVE-2025-0114"
},
{
"cve": "CVE-2025-4231",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\r\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Exposure can be reduced by limiting access to the management interface to trusted internal IP addresses as described in \nPalo Alto Networks\u0027 Security Advisory",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2025-4231"
}
]
}
ssa-794185
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SIPROTEC, SICAM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., a SICAM device) and a RADIUS server, to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details incl. external references can be found in the chapter \"Additional Information\".\nSiemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter \"Additional Information\".\nSiemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter \"Additional Information\" for details.",
"title": "Summary"
},
{
"category": "general",
"text": "Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid\u0027s reliability can thus be minimized by virtue of the grid design.\nSiemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment. \nAs a general security measure Siemens strongly recommends to protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.\n\nRecommended security guidelines can be found at:\nhttps://www.siemens.com/gridsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"category": "self",
"summary": "SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794185.json"
}
],
"title": "SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products",
"tracking": {
"current_release_date": "2025-11-11T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-794185",
"initial_release_date": "2025-05-13T00:00:00Z",
"revision_history": [
{
"date": "2025-05-13T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-08-12T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added fix for affected firmware modules in SICAM A8000 (CPCI85 for CP-8031/CP-8050, CPC80 for CP-8000/CP-8021/CP-8022, SICORE for CP-8010/CP-8012), SICAM EGS (CPCI85) and SICAM S8000 (SICORE). Added fix for SICAM Q200, for SIPROTEC 5 - CP300 and CP150 Devices, and for SIPROTEC 5 Compact 7SX800 (CP050). Added SICAM AK 3, SICAM BC, SICAM TM, SICAM GridEdge and SIPROTEC 5 - CP200 Devices to the list of known not affected products"
},
{
"date": "2025-11-11T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for SIPROTEC 5 - CP100 Devices"
}
],
"status": "interim",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c16.51",
"product": {
"name": "CPC80 Central Processing/Communication",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "CPC80 Central Processing/Communication"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c6.20",
"product": {
"name": "CPCI85 Central Processing/Communication",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "CPCI85 Central Processing/Communication"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.70",
"product": {
"name": "POWER METER SICAM Q100 family",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "POWER METER SICAM Q100 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.83",
"product": {
"name": "POWER METER SICAM Q200 family",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "POWER METER SICAM Q200 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Powerlink IP",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "Powerlink IP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM AK 3",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "SICAM AK 3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM BC",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "SICAM BC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM GridEdge (Classic)",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "SICAM GridEdge (Classic)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM GridEdge Applications for SICAM 8 Platform",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "SICAM GridEdge Applications for SICAM 8 Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.50",
"product": {
"name": "SICAM GridPass",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "SICAM GridPass"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM TM",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "SICAM TM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.20.0",
"product": {
"name": "SICORE Base system",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "SICORE Base system"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIPROTEC 5 - CP200 Devices",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 - CP200 Devices"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD84 (CP300)",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD84 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD85 (CP300)",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD86 (CP300)",
"product_id": "16"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD89 (CP300)",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD89 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c9.68",
"product": {
"name": "SIPROTEC 5 6MD89 (CP300) V9.6x",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD89 (CP300) V9.6x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MU85 (CP300)",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MU85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7KE85 (CP300)",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7KE85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SA82 (CP100)",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SA82 (CP150)",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SA86 (CP300)",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SA87 (CP300)",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SD82 (CP100)",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SD82 (CP150)",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SD86 (CP300)",
"product_id": "27"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SD87 (CP300)",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SJ81 (CP100)",
"product_id": "29"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ81 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ81 (CP150)",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ81 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SJ82 (CP100)",
"product_id": "31"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ82 (CP150)",
"product_id": "32"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ85 (CP300)",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ86 (CP300)",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SK82 (CP100)",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SK82 (CP150)",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SK85 (CP300)",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SL82 (CP100)",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SL82 (CP150)",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SL86 (CP300)",
"product_id": "40"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SL87 (CP300)",
"product_id": "41"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SS85 (CP300)",
"product_id": "42"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SS85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7ST85 (CP300)",
"product_id": "43"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c9.68",
"product": {
"name": "SIPROTEC 5 7ST85 (CP300) V9.6x",
"product_id": "44"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST85 (CP300) V9.6x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7ST86 (CP300)",
"product_id": "45"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c9.83",
"product": {
"name": "SIPROTEC 5 7ST86 (CP300) V9.8x",
"product_id": "46"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST86 (CP300) V9.8x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SX82 (CP150)",
"product_id": "47"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SX82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SX85 (CP300)",
"product_id": "48"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SX85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SY82 (CP150)",
"product_id": "49"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SY82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UM85 (CP300)",
"product_id": "50"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UM85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7UT82 (CP100)",
"product_id": "51"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT82 (CP150)",
"product_id": "52"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT85 (CP300)",
"product_id": "53"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT86 (CP300)",
"product_id": "54"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT87 (CP300)",
"product_id": "55"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7VE85 (CP300)",
"product_id": "56"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VE85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7VK87 (CP300)",
"product_id": "57"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VK87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7VU85 (CP300)",
"product_id": "58"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VU85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 Compact 7SX800 (CP050)",
"product_id": "59"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 Compact 7SX800 (CP050)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6",
"9",
"13",
"7",
"11"
]
},
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"8"
]
}
],
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"10",
"12",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59"
],
"known_not_affected": [
"6",
"7",
"8",
"9",
"11",
"13"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"10",
"12",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"10",
"12",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V10.0 or later version",
"product_ids": [
"14",
"15",
"16",
"17",
"19",
"20",
"23",
"24",
"27",
"28",
"33",
"34",
"37",
"40",
"41",
"42",
"43",
"45",
"48",
"50",
"53",
"54",
"55",
"56",
"57",
"58"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814150/"
},
{
"category": "vendor_fix",
"details": "Update to V10.0 or later version",
"product_ids": [
"22",
"26",
"30",
"32",
"36",
"39",
"47",
"49",
"52"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109757433/"
},
{
"category": "vendor_fix",
"details": "Update to V10.0 or later version",
"product_ids": [
"59"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109796884/"
},
{
"category": "vendor_fix",
"details": "Update to V16.51 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2.20.0 or later version",
"product_ids": [
"12"
]
},
{
"category": "vendor_fix",
"details": "Update to V2.50 or later version",
"product_ids": [
"10"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/"
},
{
"category": "vendor_fix",
"details": "Update to V2.70 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109743524/"
},
{
"category": "vendor_fix",
"details": "Update to V2.83 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109743592/"
},
{
"category": "vendor_fix",
"details": "Update to V6.20 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V9.68 or later version",
"product_ids": [
"18"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109742950/"
},
{
"category": "vendor_fix",
"details": "Update to V9.68 or later version",
"product_ids": [
"44"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109740299/"
},
{
"category": "vendor_fix",
"details": "Update to V9.83 or later version",
"product_ids": [
"46"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768428/"
},
{
"category": "vendor_fix",
"details": "Update to V8.90 or later V8.xx version",
"product_ids": [
"21",
"25",
"29",
"31",
"35",
"38",
"51"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"10",
"12",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59"
]
}
],
"threats": [
{
"category": "impact",
"details": "The product does not support the RADIUS protocol.",
"product_ids": [
"6",
"9",
"13",
"7",
"11"
]
},
{
"category": "impact",
"details": "The product includes a component which also supports the RADIUS protocol, but the product doesn\u0027t enable or support RADIUS.",
"product_ids": [
"8"
]
}
],
"title": "CVE-2024-3596"
}
]
}
ssa-723487
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details incl. external references can be found in the chapter \"Additional Information\".\nSiemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter \"Additional Information\".\nSiemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter \"Additional Information\" for details.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723487.json"
}
],
"title": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products",
"tracking": {
"current_release_date": "2025-07-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-723487",
"initial_release_date": "2024-07-09T00:00:00Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-07-22T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Clarified that the fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants) in V4.1.8 only covers RADIUS client mitigation C1, but not C2"
},
{
"date": "2024-11-12T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for RUGGEDCOM CROSSBOW"
},
{
"date": "2024-12-10T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix (and related important recommendations in chapter Additional Information) for RUGGEDCOM ROS V4.x devices; Added additional SINEC OS-based devices as affected products: RUGGEDCOM RST2428P and SCALANCE XC-300, XR-300, XC-400 families, and additional devices in the SCALANCE XR-500 family"
},
{
"date": "2025-01-14T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for SCALANCE W-700 IEEE 802.11ax family and for SCALANCE M-800 family (incl. S615, MUM-800 and RM1224)"
},
{
"date": "2025-03-11T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants)"
},
{
"date": "2025-06-10T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Clarified that SINEC INS is only affected when the Relay feature is used; added fix for the RUGGEDCOM RST2428P, SCALANCE XC-300, SCALANCE XC-400 and SCALANCE XR-300 (6GK5334-xTSxx) families and for some of the devices in the SCALANCE XM-400/XR-500 and SCALANCE XCM-/XRM-/XCH-/XRH-300 families"
},
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added fix for SCALANCE XB-200/XC-200/XP-200/XF-200BA/XR-300WG family, for SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family (MSPS V1.3), for RUGGEDCOM ROS V5.X family and for SINEC INS (relay feature); Clarified the applicability of the MSPS V1.3 and the SINEC OS V3.2 fix releases for product families that support both"
}
],
"status": "interim",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.6",
"product": {
"name": "RUGGEDCOM CROSSBOW",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800NC",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801NC",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802NC",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803NC",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969NC",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100NC",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200NC",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30NC",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388 V4.X",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388 V5.X",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388NC V4.X",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388NC V5.X",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000RE",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1400",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1500",
"product_id": "27"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1501",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1510",
"product_id": "29"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1511",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1512",
"product_id": "31"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1524",
"product_id": "32"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1536",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX5000",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110NC",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400NC",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401NC",
"product_id": "40"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416",
"product_id": "41"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NC",
"product_id": "42"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NCv2 V4.X",
"product_id": "43"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416NCv2 V5.X",
"product_id": "44"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416P",
"product_id": "45"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNC",
"product_id": "46"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V4.X",
"product_id": "47"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V5.X",
"product_id": "48"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416Pv2 V4.X",
"product_id": "49"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416Pv2 V5.X",
"product_id": "50"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416v2 V4.X",
"product_id": "51"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416v2 V5.X",
"product_id": "52"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900",
"product_id": "53"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900 (32M) V4.X",
"product_id": "54"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900 (32M) V5.X",
"product_id": "55"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G",
"product_id": "56"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G (32M) V4.X",
"product_id": "57"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900G (32M) V5.X",
"product_id": "58"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC",
"product_id": "59"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V4.X",
"product_id": "60"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V5.X",
"product_id": "61"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GP",
"product_id": "62"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GPNC",
"product_id": "63"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GPNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900L",
"product_id": "64"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900LNC",
"product_id": "65"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-C01",
"product_id": "66"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-XX",
"product_id": "67"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-C01",
"product_id": "68"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-XX",
"product_id": "69"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-C01",
"product_id": "70"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-XX",
"product_id": "71"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX",
"product_id": "72"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX-C01",
"product_id": "73"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC",
"product_id": "74"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V4.X",
"product_id": "75"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V5.X",
"product_id": "76"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900W",
"product_id": "77"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910",
"product_id": "78"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910L",
"product_id": "79"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910LNC",
"product_id": "80"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910NC",
"product_id": "81"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910W",
"product_id": "82"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920L",
"product_id": "83"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920LNC",
"product_id": "84"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920W",
"product_id": "85"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930L",
"product_id": "86"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930LNC",
"product_id": "87"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930W",
"product_id": "88"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940G",
"product_id": "89"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940GNC",
"product_id": "90"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969",
"product_id": "91"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969NC",
"product_id": "92"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600",
"product_id": "93"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600F",
"product_id": "94"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600FNC",
"product_id": "95"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600FNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600NC",
"product_id": "96"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600T",
"product_id": "97"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600TNC",
"product_id": "98"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000",
"product_id": "99"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000A",
"product_id": "100"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000ANC",
"product_id": "101"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000ANC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000H",
"product_id": "102"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000HNC",
"product_id": "103"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000HNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000NC",
"product_id": "104"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000T",
"product_id": "105"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000TNC",
"product_id": "106"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG907R",
"product_id": "107"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG908C",
"product_id": "108"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG909R",
"product_id": "109"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG910C",
"product_id": "110"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920P V4.X",
"product_id": "111"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920P V5.X",
"product_id": "112"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920PNC V4.X",
"product_id": "113"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920PNC V5.X",
"product_id": "114"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100",
"product_id": "115"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V4.X",
"product_id": "116"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V5.X",
"product_id": "117"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC",
"product_id": "118"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V4.X",
"product_id": "119"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"product_id": "120"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P",
"product_id": "121"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V4.X",
"product_id": "122"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V5.X",
"product_id": "123"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC",
"product_id": "124"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X",
"product_id": "125"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"product_id": "126"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200",
"product_id": "127"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200NC",
"product_id": "128"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288 V4.X",
"product_id": "129"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288 V5.X",
"product_id": "130"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288NC V4.X",
"product_id": "131"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288NC V5.X",
"product_id": "132"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300 V4.X",
"product_id": "133"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300 V5.X",
"product_id": "134"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300NC V4.X",
"product_id": "135"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300NC V5.X",
"product_id": "136"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300P V4.X",
"product_id": "137"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300P V5.X",
"product_id": "138"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300PNC V4.X",
"product_id": "139"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300PNC V5.X",
"product_id": "140"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488 V4.X",
"product_id": "141"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488 V5.X",
"product_id": "142"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488NC V4.X",
"product_id": "143"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488NC V5.X",
"product_id": "144"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910",
"product_id": "145"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910NC",
"product_id": "146"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916C",
"product_id": "147"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916P",
"product_id": "148"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228",
"product_id": "149"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228P",
"product_id": "150"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "151",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "152",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)",
"product_id": "153",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)",
"product_id": "154",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)",
"product_id": "155",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)",
"product_id": "156",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "157",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "158",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)",
"product_id": "159",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2FA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "160",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)",
"product_id": "161",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "162",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "163",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "164",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "165",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)",
"product_id": "166",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)",
"product_id": "167",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "168",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)",
"product_id": "169",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)",
"product_id": "170",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)",
"product_id": "171",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3FA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "172",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "173",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)",
"product_id": "174",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)",
"product_id": "175",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)",
"product_id": "176",
"product_identification_helper": {
"model_numbers": [
"6GK5622-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)",
"product_id": "177",
"product_identification_helper": {
"model_numbers": [
"6GK5626-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)",
"product_id": "178",
"product_identification_helper": {
"model_numbers": [
"6GK5632-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)",
"product_id": "179",
"product_identification_helper": {
"model_numbers": [
"6GK5636-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)",
"product_id": "180",
"product_identification_helper": {
"model_numbers": [
"6GK5642-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)",
"product_id": "181",
"product_identification_helper": {
"model_numbers": [
"6GK5646-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)",
"product_id": "182",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)",
"product_id": "183",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)",
"product_id": "184",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)",
"product_id": "185",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)",
"product_id": "186",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)",
"product_id": "187",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)",
"product_id": "188",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)",
"product_id": "189",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)",
"product_id": "190",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)",
"product_id": "191",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)",
"product_id": "192",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)",
"product_id": "193",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)",
"product_id": "194",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)",
"product_id": "195",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)",
"product_id": "196",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)",
"product_id": "197",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)",
"product_id": "198",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)",
"product_id": "199",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)",
"product_id": "200",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)",
"product_id": "201",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)",
"product_id": "202",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)",
"product_id": "203",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)",
"product_id": "204",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)",
"product_id": "205",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)",
"product_id": "206",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)",
"product_id": "207",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)",
"product_id": "208",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)",
"product_id": "209",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)",
"product_id": "210",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)",
"product_id": "211",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)",
"product_id": "212",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)",
"product_id": "213",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)",
"product_id": "214",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)",
"product_id": "215",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)",
"product_id": "216",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)",
"product_id": "217",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)",
"product_id": "218",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)",
"product_id": "219",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)",
"product_id": "220",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)",
"product_id": "221",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)",
"product_id": "222",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)",
"product_id": "223",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)",
"product_id": "224",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)",
"product_id": "225",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)",
"product_id": "226",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)",
"product_id": "227",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)",
"product_id": "228",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)",
"product_id": "229",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)",
"product_id": "230",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "231",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "232",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "233",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "234",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "235",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "236",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)",
"product_id": "237",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-6AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "238",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)",
"product_id": "239",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)",
"product_id": "240",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)",
"product_id": "241",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)",
"product_id": "242",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "243",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)",
"product_id": "244",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)",
"product_id": "245",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "246",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)",
"product_id": "247",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)",
"product_id": "248",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-2AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "249",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "250",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)",
"product_id": "251",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)",
"product_id": "252",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)",
"product_id": "253",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)",
"product_id": "254",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)",
"product_id": "255",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)",
"product_id": "256",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)",
"product_id": "257",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)",
"product_id": "258",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)",
"product_id": "259",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)",
"product_id": "260",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)",
"product_id": "261",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)",
"product_id": "262",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)",
"product_id": "263",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)",
"product_id": "264",
"product_identification_helper": {
"model_numbers": [
"6GK5304-2BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)",
"product_id": "265",
"product_identification_helper": {
"model_numbers": [
"6GK5306-1BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)",
"product_id": "266",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)",
"product_id": "267",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)",
"product_id": "268",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)",
"product_id": "269",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)",
"product_id": "270",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)",
"product_id": "271",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)",
"product_id": "272",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)",
"product_id": "273",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)",
"product_id": "274",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)",
"product_id": "275",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)",
"product_id": "276",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)",
"product_id": "277",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)",
"product_id": "278",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)",
"product_id": "279",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)",
"product_id": "280",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)",
"product_id": "281",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)",
"product_id": "282",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)",
"product_id": "283",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)",
"product_id": "284",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)",
"product_id": "285",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)",
"product_id": "286",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)",
"product_id": "287",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)",
"product_id": "288",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)",
"product_id": "289",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)",
"product_id": "290",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)",
"product_id": "291",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)",
"product_id": "292",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)",
"product_id": "293",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)",
"product_id": "294",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)",
"product_id": "295",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)",
"product_id": "296",
"product_identification_helper": {
"model_numbers": [
"6GK5320-1BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)",
"product_id": "297",
"product_identification_helper": {
"model_numbers": [
"6GK5320-3BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)",
"product_id": "298",
"product_identification_helper": {
"model_numbers": [
"6GK5408-2FD00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)",
"product_id": "299",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)",
"product_id": "300",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)",
"product_id": "301",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)",
"product_id": "302",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)",
"product_id": "303",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)",
"product_id": "304",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)",
"product_id": "305",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)",
"product_id": "306",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)",
"product_id": "307",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)",
"product_id": "308",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)",
"product_id": "309",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)",
"product_id": "310",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)",
"product_id": "311",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)",
"product_id": "312",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)",
"product_id": "313",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)",
"product_id": "314",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)",
"product_id": "315",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)",
"product_id": "316",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)",
"product_id": "317",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)",
"product_id": "318",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)",
"product_id": "319",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)",
"product_id": "320",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)",
"product_id": "321",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)",
"product_id": "322",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)",
"product_id": "323",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)",
"product_id": "324",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)",
"product_id": "325",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)",
"product_id": "326",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)",
"product_id": "327",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)",
"product_id": "328",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)",
"product_id": "329",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)",
"product_id": "330",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)",
"product_id": "331",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)",
"product_id": "332",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)",
"product_id": "333",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)",
"product_id": "334",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)",
"product_id": "335",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)",
"product_id": "336",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)",
"product_id": "337",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)",
"product_id": "338",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)",
"product_id": "339",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)",
"product_id": "340",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)",
"product_id": "341",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)",
"product_id": "342",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)",
"product_id": "343",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)",
"product_id": "344",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)",
"product_id": "345",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)",
"product_id": "346",
"product_identification_helper": {
"model_numbers": [
"6GK5224-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)",
"product_id": "347",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)",
"product_id": "348",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)",
"product_id": "349",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)",
"product_id": "350",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)",
"product_id": "351",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)",
"product_id": "352",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)",
"product_id": "353",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)",
"product_id": "354",
"product_identification_helper": {
"model_numbers": [
"6GK5424-8TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)",
"product_id": "355",
"product_identification_helper": {
"model_numbers": [
"6GK5428-4TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)",
"product_id": "356",
"product_identification_helper": {
"model_numbers": [
"6GK5432-0GR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)",
"product_id": "357",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)",
"product_id": "358",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)",
"product_id": "359",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)",
"product_id": "360",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)",
"product_id": "361",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)",
"product_id": "362",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)",
"product_id": "363",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)",
"product_id": "364",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)",
"product_id": "365",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0GA00-1UF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)",
"product_id": "366",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GP00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)",
"product_id": "367",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GQ00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)",
"product_id": "368",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)",
"product_id": "369",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)",
"product_id": "370",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)",
"product_id": "371",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)",
"product_id": "372",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)",
"product_id": "373",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)",
"product_id": "374",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)",
"product_id": "375",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)",
"product_id": "376",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)",
"product_id": "377",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)",
"product_id": "378",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)",
"product_id": "379",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)",
"product_id": "380",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0JA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)",
"product_id": "381",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)",
"product_id": "382",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)",
"product_id": "383",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)",
"product_id": "384",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)",
"product_id": "385",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)",
"product_id": "386",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)",
"product_id": "387",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)",
"product_id": "388",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)",
"product_id": "389",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)",
"product_id": "390",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)",
"product_id": "391",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)",
"product_id": "392",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)",
"product_id": "393",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)",
"product_id": "394",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)",
"product_id": "395",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)",
"product_id": "396",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)",
"product_id": "397",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)",
"product_id": "398",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)",
"product_id": "399",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)",
"product_id": "400",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)",
"product_id": "401",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)",
"product_id": "402",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)",
"product_id": "403",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)",
"product_id": "404",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)",
"product_id": "405",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)",
"product_id": "406",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)",
"product_id": "407",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)",
"product_id": "408",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)",
"product_id": "409",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)",
"product_id": "410",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)",
"product_id": "411",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)",
"product_id": "412",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)",
"product_id": "413",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)",
"product_id": "414",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)",
"product_id": "415",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)",
"product_id": "416",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)",
"product_id": "417",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)",
"product_id": "418",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)",
"product_id": "419",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)",
"product_id": "420",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)",
"product_id": "421",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)",
"product_id": "422",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)",
"product_id": "423",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)",
"product_id": "424",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)",
"product_id": "425",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)",
"product_id": "426",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)",
"product_id": "427",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)",
"product_id": "428",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)",
"product_id": "429",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)",
"product_id": "430",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)",
"product_id": "431",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)",
"product_id": "432",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)",
"product_id": "433",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)",
"product_id": "434",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)",
"product_id": "435",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)",
"product_id": "436",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)",
"product_id": "437",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)",
"product_id": "438",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)",
"product_id": "439",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)",
"product_id": "440",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)",
"product_id": "441",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)",
"product_id": "442",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)",
"product_id": "443",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)",
"product_id": "444",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)",
"product_id": "445",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)",
"product_id": "446",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)",
"product_id": "447",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)",
"product_id": "448",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)",
"product_id": "449",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)",
"product_id": "450",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)",
"product_id": "451",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)",
"product_id": "452",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)",
"product_id": "453",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)",
"product_id": "454",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)",
"product_id": "455",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)",
"product_id": "456",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)",
"product_id": "457",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)",
"product_id": "458",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)",
"product_id": "459",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)",
"product_id": "460",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)",
"product_id": "461",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)",
"product_id": "462",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)",
"product_id": "463",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)",
"product_id": "464",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)",
"product_id": "465",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)",
"product_id": "466",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)",
"product_id": "467",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)",
"product_id": "468",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)",
"product_id": "469",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)",
"product_id": "470",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)",
"product_id": "471",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)",
"product_id": "472",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)",
"product_id": "473",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)",
"product_id": "474",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)",
"product_id": "475",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)",
"product_id": "476",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)",
"product_id": "477",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)",
"product_id": "478",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)",
"product_id": "479",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)",
"product_id": "480",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)",
"product_id": "481",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)",
"product_id": "482",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)",
"product_id": "483",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)",
"product_id": "484",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)",
"product_id": "485",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)",
"product_id": "486",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)",
"product_id": "487",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)",
"product_id": "488",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)",
"product_id": "489",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)",
"product_id": "490",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)",
"product_id": "491",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V1.0 SP2 Update 4 only when the Relay feature is enabled",
"product": {
"name": "SINEC INS",
"product_id": "492"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)",
"product_id": "493",
"product_identification_helper": {
"model_numbers": [
"6AG1308-2FL10-4AA3"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)",
"product_id": "494",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BB00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)",
"product_id": "495",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)",
"product_id": "496",
"product_identification_helper": {
"model_numbers": [
"6AG1208-0BA00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)",
"product_id": "497",
"product_identification_helper": {
"model_numbers": [
"6AG1216-4BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"366",
"367",
"368",
"369",
"370",
"371",
"455",
"456",
"457",
"458",
"459",
"460",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP2 Update 4 or later version",
"product_ids": [
"492"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.3 or later version",
"product_ids": [
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"393",
"394",
"395",
"396",
"397",
"398",
"439",
"440",
"441",
"442",
"449",
"450",
"451",
"452",
"453",
"454",
"461",
"462",
"463",
"464",
"465",
"466",
"467"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977441/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977720/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"151",
"357",
"358",
"359",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"360"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1.9 or later version",
"product_ids": [
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"493"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109982245/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"2",
"3",
"4",
"6",
"8",
"10",
"12",
"14",
"18",
"20",
"22",
"35",
"37",
"39",
"41",
"49",
"51",
"53",
"54",
"56",
"57",
"62",
"64",
"77",
"78",
"79",
"82",
"83",
"85",
"86",
"88",
"89",
"91",
"93",
"94",
"97",
"99",
"100",
"102",
"105",
"111",
"115",
"116",
"119",
"121",
"122",
"127",
"129",
"133",
"137",
"141"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"5",
"7",
"9",
"11",
"13",
"15",
"19",
"36",
"38",
"40",
"42",
"43",
"45",
"46",
"47",
"59",
"60",
"63",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"80",
"81",
"84",
"87",
"90",
"92",
"95",
"96",
"98",
"101",
"103",
"104",
"106",
"113",
"118",
"124",
"125",
"128",
"131",
"135",
"139",
"143"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.6 or later version",
"product_ids": [
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"361",
"362",
"363",
"364",
"365",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"435",
"436",
"437",
"438",
"443",
"444",
"445",
"446",
"447",
"448",
"494",
"495",
"496",
"497"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977185/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"21",
"50",
"52",
"55",
"58",
"107",
"108",
"109",
"110",
"112",
"117",
"123",
"130",
"134",
"138",
"142",
"145",
"147",
"148",
"149",
"150"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"23",
"44",
"48",
"61",
"76",
"114",
"120",
"126",
"132",
"136",
"140",
"144",
"146"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.6 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976555/"
},
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"16",
"17",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95",
"96",
"97",
"98",
"99",
"100",
"101",
"102",
"103",
"104",
"105",
"106",
"107",
"108",
"109",
"110",
"111",
"112",
"113",
"114",
"115",
"116",
"117",
"118",
"119",
"120",
"121",
"122",
"123",
"124",
"125",
"126",
"127",
"128",
"129",
"130",
"131",
"132",
"133",
"134",
"135",
"136",
"137",
"138",
"139",
"140",
"141",
"142",
"143",
"144",
"145",
"146",
"147",
"148",
"149",
"150",
"151",
"152",
"153",
"154",
"155",
"156",
"157",
"158",
"159",
"160",
"161",
"162",
"163",
"164",
"165",
"166",
"167",
"168",
"169",
"170",
"171",
"172",
"173",
"174",
"175",
"176",
"177",
"178",
"179",
"180",
"181",
"182",
"183",
"184",
"185",
"186",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200",
"201",
"202",
"203",
"204",
"205",
"206",
"207",
"208",
"209",
"210",
"211",
"212",
"213",
"214",
"215",
"216",
"217",
"218",
"219",
"220",
"221",
"222",
"223",
"224",
"225",
"226",
"227",
"228",
"229",
"230",
"231",
"232",
"233",
"234",
"235",
"236",
"237",
"238",
"239",
"240",
"241",
"242",
"243",
"244",
"245",
"246",
"247",
"248",
"249",
"250",
"251",
"252",
"253",
"254",
"255",
"256",
"257",
"258",
"259",
"260",
"261",
"262",
"263",
"264",
"265",
"266",
"267",
"268",
"269",
"270",
"271",
"272",
"273",
"274",
"275",
"276",
"277",
"278",
"279",
"280",
"281",
"282",
"283",
"284",
"285",
"286",
"287",
"288",
"289",
"290",
"291",
"292",
"293",
"294",
"295",
"296",
"297",
"298",
"299",
"300",
"301",
"302",
"303",
"304",
"305",
"306",
"307",
"308",
"309",
"310",
"311",
"312",
"313",
"314",
"315",
"316",
"317",
"318",
"319",
"320",
"321",
"322",
"323",
"324",
"325",
"326",
"327",
"328",
"329",
"330",
"331",
"332",
"333",
"334",
"335",
"336",
"337",
"338",
"339",
"340",
"341",
"342",
"343",
"344",
"345",
"346",
"347",
"348",
"349",
"350",
"351",
"352",
"353",
"354",
"355",
"356",
"357",
"358",
"359",
"360",
"361",
"362",
"363",
"364",
"365",
"366",
"367",
"368",
"369",
"370",
"371",
"372",
"373",
"374",
"375",
"376",
"377",
"378",
"379",
"380",
"381",
"382",
"383",
"384",
"385",
"386",
"387",
"388",
"389",
"390",
"391",
"392",
"393",
"394",
"395",
"396",
"397",
"398",
"399",
"400",
"401",
"402",
"403",
"404",
"405",
"406",
"407",
"408",
"409",
"410",
"411",
"412",
"413",
"414",
"415",
"416",
"417",
"418",
"419",
"420",
"421",
"422",
"423",
"424",
"425",
"426",
"427",
"428",
"429",
"430",
"431",
"432",
"433",
"434",
"435",
"436",
"437",
"438",
"439",
"440",
"441",
"442",
"443",
"444",
"445",
"446",
"447",
"448",
"449",
"450",
"451",
"452",
"453",
"454",
"455",
"456",
"457",
"458",
"459",
"460",
"461",
"462",
"463",
"464",
"465",
"466",
"467",
"468",
"469",
"470",
"471",
"472",
"473",
"474",
"475",
"476",
"477",
"478",
"479",
"480",
"481",
"482",
"483",
"484",
"485",
"486",
"487",
"488",
"489",
"490",
"491",
"492",
"493",
"494",
"495",
"496",
"497"
]
}
],
"title": "CVE-2024-3596"
}
]
}
SSA-364175
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] \nhttps://security.paloaltonetworks.com/",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-364175.html"
},
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-364175.json"
}
],
"title": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1",
"tracking": {
"current_release_date": "2025-07-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-364175",
"initial_release_date": "2024-07-09T00:00:00Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-08-13T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added newly published CVE-2024-5913 and CVE-2024-3596"
},
{
"date": "2024-10-08T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-48795, CVE-2024-3596, CVE-2024-5913 and fix version information for Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices"
},
{
"date": "2024-11-12T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added newly published CVE-2024-9468 and CVE-2024-9471. Added CVSSv4.0 vector to CVE-2024-5913"
},
{
"date": "2024-12-10T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added newly published CVE-2024-5920"
},
{
"date": "2025-04-08T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added newly published CVE-2025-0114"
},
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added newly published CVE-2025-4231"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-5913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-5913"
},
{
"cve": "CVE-2024-5920",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator\u0027s browser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-5920"
},
{
"cve": "CVE-2024-9468",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-9468"
},
{
"cve": "CVE-2024-9471",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2024-9471"
},
{
"cve": "CVE-2025-0114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"3"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"3"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"3"
]
}
],
"title": "CVE-2025-0114"
},
{
"cve": "CVE-2025-4231",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\r\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Exposure can be reduced by limiting access to the management interface to trusted internal IP addresses as described in \nPalo Alto Networks\u0027 Security Advisory",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"2"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2"
]
}
],
"title": "CVE-2025-4231"
}
]
}
rhsa-2024_4911
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4911",
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4911.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:19+00:00",
"generator": {
"date": "2024-12-31T03:58:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4911",
"initial_release_date": "2024-07-30T09:01:51+00:00",
"revision_history": [
{
"date": "2024-07-30T09:01:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T09:01:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.src",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T09:01:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4911
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4911",
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4911.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:36+00:00",
"generator": {
"date": "2025-11-06T22:43:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4911",
"initial_release_date": "2024-07-30T09:01:51+00:00",
"revision_history": [
{
"date": "2024-07-30T09:01:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T09:01:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.src",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T09:01:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:9474
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9474",
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9474.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:45:03+00:00",
"generator": {
"date": "2025-11-06T22:45:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:9474",
"initial_release_date": "2024-11-12T10:32:05+00:00",
"revision_history": [
{
"date": "2024-11-12T10:32:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:32:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:45:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-4.el9_5.src",
"product": {
"name": "krb5-0:1.21.1-4.el9_5.src",
"product_id": "krb5-0:1.21.1-4.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-4.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product_id": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product_id": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.i686",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686",
"product_id": "libkadm5-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product_id": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product_id": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src"
},
"product_reference": "krb5-0:1.21.1-4.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src"
},
"product_reference": "krb5-0:1.21.1-4.el9_5.src",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:32:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8788
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8788",
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "RHEL-55453",
"url": "https://issues.redhat.com/browse/RHEL-55453"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8788.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:56+00:00",
"generator": {
"date": "2025-11-06T22:44:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8788",
"initial_release_date": "2024-11-04T01:44:02+00:00",
"revision_history": [
{
"date": "2024-11-04T01:44:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:44:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.15.1-55.el7_9.3.src",
"product": {
"name": "krb5-0:1.15.1-55.el7_9.3.src",
"product_id": "krb5-0:1.15.1-55.el7_9.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.15.1-55.el7_9.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.15.1-55.el7_9.3.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src"
},
"product_reference": "krb5-0:1.15.1-55.el7_9.3.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:44:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4828
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4828",
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4828.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:32+00:00",
"generator": {
"date": "2025-11-06T22:43:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4828",
"initial_release_date": "2024-07-24T13:19:11+00:00",
"revision_history": [
{
"date": "2024-07-24T13:19:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:19:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.src",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:19:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4935
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4935",
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4935.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:38+00:00",
"generator": {
"date": "2025-11-06T22:43:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4935",
"initial_release_date": "2024-07-31T10:40:25+00:00",
"revision_history": [
{
"date": "2024-07-31T10:40:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T10:40:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.src",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.src",
"product_id": "freeradius-0:3.0.21-40.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T10:40:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8794
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8794",
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8794.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:58+00:00",
"generator": {
"date": "2025-11-06T22:44:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8794",
"initial_release_date": "2024-11-04T01:44:12+00:00",
"revision_history": [
{
"date": "2024-11-04T01:44:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:44:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-16.el8_6.2.src",
"product": {
"name": "krb5-0:1.18.2-16.el8_6.2.src",
"product_id": "krb5-0:1.18.2-16.el8_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-16.el8_6.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:44:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:9547
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9547",
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9547.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:45:04+00:00",
"generator": {
"date": "2025-11-06T22:45:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:9547",
"initial_release_date": "2024-11-13T15:58:23+00:00",
"revision_history": [
{
"date": "2024-11-13T15:58:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-13T15:58:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:45:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-2.el9_4.1.src",
"product": {
"name": "krb5-0:1.21.1-2.el9_4.1.src",
"product_id": "krb5-0:1.21.1-2.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-2.el9_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.1.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:58:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8577
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8577",
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8577.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:39+00:00",
"generator": {
"date": "2024-12-31T03:57:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8577",
"initial_release_date": "2024-10-29T18:51:38+00:00",
"revision_history": [
{
"date": "2024-10-29T18:51:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-29T18:51:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.19.1-16.el9_0.2.src",
"product": {
"name": "krb5-0:1.19.1-16.el9_0.2.src",
"product_id": "krb5-0:1.19.1-16.el9_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.19.1-16.el9_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.2.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.2.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-29T18:51:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8789
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8789",
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8789.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:57+00:00",
"generator": {
"date": "2025-11-06T22:44:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8789",
"initial_release_date": "2024-11-04T01:11:07+00:00",
"revision_history": [
{
"date": "2024-11-04T01:11:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:11:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.17-19.el8_2.2.src",
"product": {
"name": "krb5-0:1.17-19.el8_2.2.src",
"product_id": "krb5-0:1.17-19.el8_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.17-19.el8_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.2.i686",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.2.i686",
"product_id": "libkadm5-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product_id": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.17-19.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src"
},
"product_reference": "krb5-0:1.17-19.el8_2.2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:11:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4874
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.4 Telecommunications Update Service, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4874",
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4874.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:39+00:00",
"generator": {
"date": "2024-12-31T03:57:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4874",
"initial_release_date": "2024-07-25T15:53:18+00:00",
"revision_history": [
{
"date": "2024-07-25T15:53:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-25T15:53:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius:3.0:8040020240719063921:9ab73fbf",
"product": {
"name": "freeradius:3.0:8040020240719063921:9ab73fbf",
"product_id": "freeradius:3.0:8040020240719063921:9ab73fbf",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/freeradius@3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
"product_reference": "freeradius:3.0:8040020240719063921:9ab73fbf",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
"product_reference": "freeradius:3.0:8040020240719063921:9ab73fbf",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
"product_reference": "freeradius:3.0:8040020240719063921:9ab73fbf",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-25T15:53:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le",
"AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64",
"AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8794
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8794",
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8794.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:11+00:00",
"generator": {
"date": "2024-12-31T03:58:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8794",
"initial_release_date": "2024-11-04T01:44:12+00:00",
"revision_history": [
{
"date": "2024-11-04T01:44:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:44:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-16.el8_6.2.src",
"product": {
"name": "krb5-0:1.18.2-16.el8_6.2.src",
"product_id": "krb5-0:1.18.2-16.el8_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-16.el8_6.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:44:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8577
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8577",
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8577.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:52+00:00",
"generator": {
"date": "2025-11-06T22:44:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8577",
"initial_release_date": "2024-10-29T18:51:38+00:00",
"revision_history": [
{
"date": "2024-10-29T18:51:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-29T18:51:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.19.1-16.el9_0.2.src",
"product": {
"name": "krb5-0:1.19.1-16.el9_0.2.src",
"product_id": "krb5-0:1.19.1-16.el9_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.19.1-16.el9_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.2.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.2.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-29T18:51:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4829
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4829",
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4829.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:33+00:00",
"generator": {
"date": "2025-11-06T22:43:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4829",
"initial_release_date": "2024-07-24T13:27:43+00:00",
"revision_history": [
{
"date": "2024-07-24T13:27:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:27:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=src\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8791
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8791",
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8791.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:50+00:00",
"generator": {
"date": "2024-12-31T03:57:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8791",
"initial_release_date": "2024-11-04T01:28:32+00:00",
"revision_history": [
{
"date": "2024-11-04T01:28:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:28:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-9.el8_4.2.src",
"product": {
"name": "krb5-0:1.18.2-9.el8_4.2.src",
"product_id": "krb5-0:1.18.2-9.el8_4.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-9.el8_4.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:28:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8461
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8461",
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8461.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:29+00:00",
"generator": {
"date": "2024-12-31T03:57:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8461",
"initial_release_date": "2024-10-24T17:57:50+00:00",
"revision_history": [
{
"date": "2024-10-24T17:57:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T17:57:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.20.1-9.el9_2.2.src",
"product": {
"name": "krb5-0:1.20.1-9.el9_2.2.src",
"product_id": "krb5-0:1.20.1-9.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.20.1-9.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.2.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T17:57:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4828
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4828",
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4828.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:15+00:00",
"generator": {
"date": "2024-12-31T03:57:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4828",
"initial_release_date": "2024-07-24T13:19:11+00:00",
"revision_history": [
{
"date": "2024-07-24T13:19:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:19:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.src",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:19:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4826
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4826",
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4826.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:32+00:00",
"generator": {
"date": "2025-11-06T22:43:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4826",
"initial_release_date": "2024-07-24T13:19:12+00:00",
"revision_history": [
{
"date": "2024-07-24T13:19:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:19:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=src\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:19:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8792
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8792",
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8792.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:58+00:00",
"generator": {
"date": "2025-11-06T22:44:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8792",
"initial_release_date": "2024-11-04T01:50:17+00:00",
"revision_history": [
{
"date": "2024-11-04T01:50:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:50:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-26.el8_8.3.src",
"product": {
"name": "krb5-0:1.18.2-26.el8_8.3.src",
"product_id": "krb5-0:1.18.2-26.el8_8.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-26.el8_8.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-26.el8_8.3.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src"
},
"product_reference": "krb5-0:1.18.2-26.el8_8.3.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:50:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4826
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4826",
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4826.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:04+00:00",
"generator": {
"date": "2024-12-31T03:57:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4826",
"initial_release_date": "2024-07-24T13:19:12+00:00",
"revision_history": [
{
"date": "2024-07-24T13:19:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:19:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius:3.0:8060020240719034751:830b6f11",
"product": {
"name": "freeradius:3.0:8060020240719034751:830b6f11",
"product_id": "freeradius:3.0:8060020240719034751:830b6f11",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/freeradius@3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
"product_reference": "freeradius:3.0:8060020240719034751:830b6f11",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
"product_reference": "freeradius:3.0:8060020240719034751:830b6f11",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
"product_reference": "freeradius:3.0:8060020240719034751:830b6f11",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:19:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x",
"AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64",
"AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4912
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4912",
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4912.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:07+00:00",
"generator": {
"date": "2024-12-31T03:58:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4912",
"initial_release_date": "2024-07-30T08:53:46+00:00",
"revision_history": [
{
"date": "2024-07-30T08:53:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T08:53:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.src",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.src",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T08:53:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4913
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4913",
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4913.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:37+00:00",
"generator": {
"date": "2025-11-06T22:43:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4913",
"initial_release_date": "2024-07-30T08:52:26+00:00",
"revision_history": [
{
"date": "2024-07-30T08:52:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T08:52:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=src\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T08:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4828
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4828",
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4828.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:32+00:00",
"generator": {
"date": "2025-11-06T22:43:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4828",
"initial_release_date": "2024-07-24T13:19:11+00:00",
"revision_history": [
{
"date": "2024-07-24T13:19:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:19:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-38.el9_2.2.src",
"product": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src",
"product_id": "freeradius-0:3.0.21-38.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:19:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src",
"CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x",
"CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:9547
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9547",
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9547.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:45:04+00:00",
"generator": {
"date": "2025-11-06T22:45:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:9547",
"initial_release_date": "2024-11-13T15:58:23+00:00",
"revision_history": [
{
"date": "2024-11-13T15:58:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-13T15:58:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:45:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-2.el9_4.1.src",
"product": {
"name": "krb5-0:1.21.1-2.el9_4.1.src",
"product_id": "krb5-0:1.21.1-2.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-2.el9_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.1.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:58:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8461
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8461",
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8461.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:49+00:00",
"generator": {
"date": "2025-11-06T22:44:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8461",
"initial_release_date": "2024-10-24T17:57:50+00:00",
"revision_history": [
{
"date": "2024-10-24T17:57:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T17:57:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.20.1-9.el9_2.2.src",
"product": {
"name": "krb5-0:1.20.1-9.el9_2.2.src",
"product_id": "krb5-0:1.20.1-9.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.20.1-9.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.2.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T17:57:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8791
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8791",
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8791.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:57+00:00",
"generator": {
"date": "2025-11-06T22:44:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8791",
"initial_release_date": "2024-11-04T01:28:32+00:00",
"revision_history": [
{
"date": "2024-11-04T01:28:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:28:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-9.el8_4.2.src",
"product": {
"name": "krb5-0:1.18.2-9.el8_4.2.src",
"product_id": "krb5-0:1.18.2-9.el8_4.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-9.el8_4.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:28:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_9474
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9474",
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9474.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:59:49+00:00",
"generator": {
"date": "2024-12-31T03:59:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:9474",
"initial_release_date": "2024-11-12T10:32:05+00:00",
"revision_history": [
{
"date": "2024-11-12T10:32:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:32:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:59:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-4.el9_5.src",
"product": {
"name": "krb5-0:1.21.1-4.el9_5.src",
"product_id": "krb5-0:1.21.1-4.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-4.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product_id": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product_id": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.i686",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686",
"product_id": "libkadm5-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product_id": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product_id": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src"
},
"product_reference": "krb5-0:1.21.1-4.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src"
},
"product_reference": "krb5-0:1.21.1-4.el9_5.src",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:32:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4874
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.4 Telecommunications Update Service, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4874",
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4874.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:36+00:00",
"generator": {
"date": "2025-11-06T22:43:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4874",
"initial_release_date": "2024-07-25T15:53:18+00:00",
"revision_history": [
{
"date": "2024-07-25T15:53:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-25T15:53:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=src\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-25T15:53:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:10852
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated images are now available for Red Hat OpenShift AI.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of RHOAI 2.16.0 provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:10852",
"url": "https://access.redhat.com/errata/RHSA-2024:10852"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_ai/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-49767",
"url": "https://access.redhat.com/security/cve/CVE-2024-49767"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-3596",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-24786",
"url": "https://access.redhat.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-10963",
"url": "https://access.redhat.com/security/cve/CVE-2024-10963"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10852.json"
}
],
"title": "Red Hat Security Advisory: RHOAI 2.16.0 - Red Hat OpenShift AI",
"tracking": {
"current_release_date": "2025-11-15T00:16:01+00:00",
"generator": {
"date": "2025-11-15T00:16:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:10852",
"initial_release_date": "2024-12-05T14:54:56+00:00",
"revision_history": [
{
"date": "2024-12-05T14:54:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-03-25T20:51:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-15T00:16:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift AI 2.16",
"product": {
"name": "Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_ai:2.16::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift AI"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"product_id": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-codeflare-operator-rhel8@sha256%3A3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733112229"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"product_id": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-dashboard-rhel8@sha256%3Ac2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733133582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-data-science-pipelines-argo-argoexec-rhel8@sha256%3A0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953924"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256%3Ac5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953924"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-data-science-pipelines-operator-controller-rhel8@sha256%3A4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953816"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"product_id": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-kf-notebook-controller-rhel8@sha256%3A3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953706"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"product_id": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-kuberay-operator-controller-rhel8@sha256%3Aefe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733112196"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"product_id": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-kueue-controller-rhel8@sha256%3A1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733126703"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-ml-pipelines-api-server-v2-rhel8@sha256%3A4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-ml-pipelines-driver-rhel8@sha256%3A348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-ml-pipelines-launcher-rhel8@sha256%3Af1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256%3Aab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256%3A59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"product_id": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-mlmd-grpc-server-rhel8@sha256%3Ad0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953940"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"product_id": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-mm-rest-proxy-rhel8@sha256%3Ac693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953738"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"product_id": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-model-controller-rhel8@sha256%3A56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"product_id": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-model-registry-operator-rhel8@sha256%3A1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954095"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"product_id": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-model-registry-rhel8@sha256%3A60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954132"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"product_id": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-modelmesh-runtime-adapter-rhel8@sha256%3A5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953768"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"product_id": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-modelmesh-serving-controller-rhel8@sha256%3A873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953753"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"product_id": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-modelmesh-rhel8@sha256%3A6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732899102"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"product_id": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-notebook-controller-rhel8@sha256%3Af96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953706"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"product_id": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-operator-bundle@sha256%3A3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733155920"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"product_id": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-rhel8-operator@sha256%3A8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733155448"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"product_id": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-training-operator-rhel8@sha256%3A68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954151"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"product_id": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-trustyai-service-operator-rhel8@sha256%3Aba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954483"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
"product": {
"name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
"product_id": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odh-trustyai-service-rhel8@sha256%3Afeebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732898906"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64 as a component of Red Hat OpenShift AI 2.16",
"product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
},
"product_reference": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
"relates_to_product_reference": "Red Hat OpenShift AI 2.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-05T14:54:56+00:00",
"details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10852"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
},
{
"cve": "CVE-2024-10963",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2024-11-07T07:38:52.548000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2324291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_access is rated with an Important severity because it directly impacts the integrity of access control mechanisms in secure environments. By allowing hostname spoofing to bypass restrictions intended for specific local TTYs or services, the vulnerability enables attackers with minimal effort to exploit gaps in security policies that rely on access.conf configurations. The potential for unauthorized access is significant, as attackers with root privileges on any networked device can impersonate trusted service names to evade local access controls.\n\nThis vulnerability was introduced in RHEL-9.4 and does not affect previous versions of RHEL-9.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64"
],
"known_not_affected": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-10963"
},
{
"category": "external",
"summary": "RHBZ#2324291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10963",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10963"
}
],
"release_date": "2024-11-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-05T14:54:56+00:00",
"details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10852"
},
{
"category": "workaround",
"details": "To reduce the risk, administrators should ensure that no DNS hostname matches local TTY or service names used in pam_access. Additionally, implement DNSSEC to prevent spoofing of DNS responses. For stronger protection, consider reconfiguring pam_access to only accept fully qualified domain names (FQDNs) in access.conf",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268046"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to ensure the most restrictive setting needed for operational requirements. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, enabling capabilities like excessive CPU usage, long execution times, or processes consuming abnormal amounts of memory. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing infinite loops caused by malformed or unexpected input, such as unbounded user input or unexpected null values that cause loops to never terminate. In the event of successful exploitation, process isolation limits the effect of an infinite loop to a single process rather than allowing it to consume all system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64"
],
"known_not_affected": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "RHBZ#2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
},
{
"category": "external",
"summary": "https://go.dev/cl/569356",
"url": "https://go.dev/cl/569356"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/",
"url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2611",
"url": "https://pkg.go.dev/vuln/GO-2024-2611"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-05T14:54:56+00:00",
"details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10852"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-10-25T20:00:37.993073+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2321829"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Werkzueg web application library. Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting and trigger a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption | CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that help detect excessive resource usage caused by malicious activity or misconfigurations. In the event of exploitation, process isolation ensures workloads run in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64"
],
"known_not_affected": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-49767"
},
{
"category": "external",
"summary": "RHBZ#2321829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2321829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767"
},
{
"category": "external",
"summary": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee",
"url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"
},
{
"category": "external",
"summary": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b",
"url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"
},
{
"category": "external",
"summary": "https://github.com/pallets/werkzeug/releases/tag/3.0.6",
"url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6"
},
{
"category": "external",
"summary": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2",
"url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"
}
],
"release_date": "2024-10-25T19:41:35.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-05T14:54:56+00:00",
"details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:10852"
},
{
"category": "workaround",
"details": "The Request.max_content_length setting and resource limits provided by deployment software and platforms are available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.",
"product_ids": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
"Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms"
}
]
}
RHSA-2024:8788
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8788",
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "RHEL-55453",
"url": "https://issues.redhat.com/browse/RHEL-55453"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8788.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:56+00:00",
"generator": {
"date": "2025-11-06T22:44:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8788",
"initial_release_date": "2024-11-04T01:44:02+00:00",
"revision_history": [
{
"date": "2024-11-04T01:44:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:44:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.15.1-55.el7_9.3.src",
"product": {
"name": "krb5-0:1.15.1-55.el7_9.3.src",
"product_id": "krb5-0:1.15.1-55.el7_9.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.15.1-55.el7_9.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.15.1-55.el7_9.3.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src"
},
"product_reference": "krb5-0:1.15.1-55.el7_9.3.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:44:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4829
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4829",
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4829.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2024-12-31T03:57:27+00:00",
"generator": {
"date": "2024-12-31T03:57:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4829",
"initial_release_date": "2024-07-24T13:27:43+00:00",
"revision_history": [
{
"date": "2024-07-24T13:27:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:27:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:57:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius:3.0:8080020240719112231:b012cf7d",
"product": {
"name": "freeradius:3.0:8080020240719112231:b012cf7d",
"product_id": "freeradius:3.0:8080020240719112231:b012cf7d",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/freeradius@3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
"product_reference": "freeradius:3.0:8080020240719112231:b012cf7d",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x",
"AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4936
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4936",
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4936.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:50+00:00",
"generator": {
"date": "2024-12-31T03:58:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4936",
"initial_release_date": "2024-07-31T10:30:35+00:00",
"revision_history": [
{
"date": "2024-07-31T10:30:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T10:30:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius:3.0:8100020230904084920:69ef70f8",
"product": {
"name": "freeradius:3.0:8100020230904084920:69ef70f8",
"product_id": "freeradius:3.0:8100020230904084920:69ef70f8",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/freeradius@3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
"product_reference": "freeradius:3.0:8100020230904084920:69ef70f8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T10:30:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4936
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4936",
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4936.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:38+00:00",
"generator": {
"date": "2025-11-06T22:43:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4936",
"initial_release_date": "2024-07-31T10:30:35+00:00",
"revision_history": [
{
"date": "2024-07-31T10:30:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T10:30:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=src\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T10:30:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4935
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4935",
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4935.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:38+00:00",
"generator": {
"date": "2025-11-06T22:43:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4935",
"initial_release_date": "2024-07-31T10:40:25+00:00",
"revision_history": [
{
"date": "2024-07-31T10:40:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T10:40:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.src",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.src",
"product_id": "freeradius-0:3.0.21-40.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T10:40:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4912
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4912",
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4912.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:37+00:00",
"generator": {
"date": "2025-11-06T22:43:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4912",
"initial_release_date": "2024-07-30T08:53:46+00:00",
"revision_history": [
{
"date": "2024-07-30T08:53:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T08:53:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.src",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.src",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T08:53:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4829
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4829",
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4829.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:33+00:00",
"generator": {
"date": "2025-11-06T22:43:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4829",
"initial_release_date": "2024-07-24T13:27:43+00:00",
"revision_history": [
{
"date": "2024-07-24T13:27:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:27:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=src\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8080020240719112231:b012cf7d"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:27:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x::freeradius:3.0",
"AppStream-8.8.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8860
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8860",
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "RHEL-50253",
"url": "https://issues.redhat.com/browse/RHEL-50253"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8860.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:43+00:00",
"generator": {
"date": "2024-12-31T03:58:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8860",
"initial_release_date": "2024-11-05T01:54:00+00:00",
"revision_history": [
{
"date": "2024-11-05T01:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T01:54:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-30.el8_10.src",
"product": {
"name": "krb5-0:1.18.2-30.el8_10.src",
"product_id": "krb5-0:1.18.2-30.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-30.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product_id": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product_id": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.i686",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.i686",
"product_id": "libkadm5-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product_id": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product_id": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-30.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src"
},
"product_reference": "krb5-0:1.18.2-30.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T01:54:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4935
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4935",
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4935.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:39+00:00",
"generator": {
"date": "2024-12-31T03:58:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4935",
"initial_release_date": "2024-07-31T10:40:25+00:00",
"revision_history": [
{
"date": "2024-07-31T10:40:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T10:40:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.src",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.src",
"product_id": "freeradius-0:3.0.21-40.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product_id": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T10:40:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8860
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8860",
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "RHEL-50253",
"url": "https://issues.redhat.com/browse/RHEL-50253"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8860.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:59+00:00",
"generator": {
"date": "2025-11-06T22:44:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8860",
"initial_release_date": "2024-11-05T01:54:00+00:00",
"revision_history": [
{
"date": "2024-11-05T01:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T01:54:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-30.el8_10.src",
"product": {
"name": "krb5-0:1.18.2-30.el8_10.src",
"product_id": "krb5-0:1.18.2-30.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-30.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product_id": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product_id": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.i686",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.i686",
"product_id": "libkadm5-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product_id": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product_id": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-30.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src"
},
"product_reference": "krb5-0:1.18.2-30.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T01:54:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4826
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4826",
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4826.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:32+00:00",
"generator": {
"date": "2025-11-06T22:43:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4826",
"initial_release_date": "2024-07-24T13:19:12+00:00",
"revision_history": [
{
"date": "2024-07-24T13:19:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T13:19:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=src\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64\u0026rpmmod=freeradius:3.0:8060020240719034751:830b6f11"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T13:19:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x::freeradius:3.0",
"AppStream-8.6.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0",
"AppStream-8.6.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8792
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8792",
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8792.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:58+00:00",
"generator": {
"date": "2025-11-06T22:44:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8792",
"initial_release_date": "2024-11-04T01:50:17+00:00",
"revision_history": [
{
"date": "2024-11-04T01:50:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:50:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-26.el8_8.3.src",
"product": {
"name": "krb5-0:1.18.2-26.el8_8.3.src",
"product_id": "krb5-0:1.18.2-26.el8_8.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-26.el8_8.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-26.el8_8.3.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src"
},
"product_reference": "krb5-0:1.18.2-26.el8_8.3.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:50:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4912
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4912",
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4912.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:37+00:00",
"generator": {
"date": "2025-11-06T22:43:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4912",
"initial_release_date": "2024-07-30T08:53:46+00:00",
"revision_history": [
{
"date": "2024-07-30T08:53:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T08:53:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.src",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.src",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T08:53:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:4874
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.4 Telecommunications Update Service, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4874",
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4874.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:36+00:00",
"generator": {
"date": "2025-11-06T22:43:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4874",
"initial_release_date": "2024-07-25T15:53:18+00:00",
"revision_history": [
{
"date": "2024-07-25T15:53:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-25T15:53:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=src\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le\u0026rpmmod=freeradius:3.0:8040020240719063921:9ab73fbf"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-25T15:53:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.AUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le::freeradius:3.0",
"AppStream-8.4.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0",
"AppStream-8.4.0.Z.TUS:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8789
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8789",
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8789.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:57+00:00",
"generator": {
"date": "2025-11-06T22:44:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8789",
"initial_release_date": "2024-11-04T01:11:07+00:00",
"revision_history": [
{
"date": "2024-11-04T01:11:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:11:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.17-19.el8_2.2.src",
"product": {
"name": "krb5-0:1.17-19.el8_2.2.src",
"product_id": "krb5-0:1.17-19.el8_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.17-19.el8_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.2.i686",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.2.i686",
"product_id": "libkadm5-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product_id": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.17-19.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src"
},
"product_reference": "krb5-0:1.17-19.el8_2.2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:11:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8794
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8794",
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8794.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:58+00:00",
"generator": {
"date": "2025-11-06T22:44:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8794",
"initial_release_date": "2024-11-04T01:44:12+00:00",
"revision_history": [
{
"date": "2024-11-04T01:44:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:44:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-16.el8_6.2.src",
"product": {
"name": "krb5-0:1.18.2-16.el8_6.2.src",
"product_id": "krb5-0:1.18.2-16.el8_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-16.el8_6.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product_id": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src"
},
"product_reference": "krb5-0:1.18.2-16.el8_6.2.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:44:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x",
"BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686",
"BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8788
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8788",
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "RHEL-55453",
"url": "https://issues.redhat.com/browse/RHEL-55453"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8788.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:33+00:00",
"generator": {
"date": "2024-12-31T03:58:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8788",
"initial_release_date": "2024-11-04T01:44:02+00:00",
"revision_history": [
{
"date": "2024-11-04T01:44:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:44:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.15.1-55.el7_9.3.src",
"product": {
"name": "krb5-0:1.15.1-55.el7_9.3.src",
"product_id": "krb5-0:1.15.1-55.el7_9.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.15.1-55.el7_9.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.15.1-55.el7_9.3.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src"
},
"product_reference": "krb5-0:1.15.1-55.el7_9.3.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
},
"product_reference": "libkadm5-0:1.15.1-55.el7_9.3.x86_64",
"relates_to_product_reference": "7Server-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:44:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x",
"7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8791
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8791",
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8791.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:57+00:00",
"generator": {
"date": "2025-11-06T22:44:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8791",
"initial_release_date": "2024-11-04T01:28:32+00:00",
"revision_history": [
{
"date": "2024-11-04T01:28:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:28:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-9.el8_4.2.src",
"product": {
"name": "krb5-0:1.18.2-9.el8_4.2.src",
"product_id": "krb5-0:1.18.2-9.el8_4.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-9.el8_4.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src"
},
"product_reference": "krb5-0:1.18.2-9.el8_4.2.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:28:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le",
"BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686",
"BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8792
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8792",
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8792.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:22+00:00",
"generator": {
"date": "2024-12-31T03:58:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8792",
"initial_release_date": "2024-11-04T01:50:17+00:00",
"revision_history": [
{
"date": "2024-11-04T01:50:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:50:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-26.el8_8.3.src",
"product": {
"name": "krb5-0:1.18.2-26.el8_8.3.src",
"product_id": "krb5-0:1.18.2-26.el8_8.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-26.el8_8.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product_id": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-26.el8_8.3.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src"
},
"product_reference": "krb5-0:1.18.2-26.el8_8.3.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:50:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x",
"BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:9474
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9474",
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9474.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:45:03+00:00",
"generator": {
"date": "2025-11-06T22:45:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:9474",
"initial_release_date": "2024-11-12T10:32:05+00:00",
"revision_history": [
{
"date": "2024-11-12T10:32:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:32:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:45:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-4.el9_5.src",
"product": {
"name": "krb5-0:1.21.1-4.el9_5.src",
"product_id": "krb5-0:1.21.1-4.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-4.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product_id": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product_id": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.i686",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686",
"product_id": "libkadm5-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product_id": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product_id": "libkadm5-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product_id": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src"
},
"product_reference": "krb5-0:1.21.1-4.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src"
},
"product_reference": "krb5-0:1.21.1-4.el9_5.src",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:32:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x",
"BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8860
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8860",
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "RHEL-50253",
"url": "https://issues.redhat.com/browse/RHEL-50253"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8860.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:59+00:00",
"generator": {
"date": "2025-11-06T22:44:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8860",
"initial_release_date": "2024-11-05T01:54:00+00:00",
"revision_history": [
{
"date": "2024-11-05T01:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T01:54:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.18.2-30.el8_10.src",
"product": {
"name": "krb5-0:1.18.2-30.el8_10.src",
"product_id": "krb5-0:1.18.2-30.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.18.2-30.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product_id": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product_id": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.i686",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.i686",
"product_id": "libkadm5-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product_id": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product_id": "libkadm5-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.18.2-30.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src"
},
"product_reference": "krb5-0:1.18.2-30.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-devel-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-libs-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "libkadm5-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T01:54:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4911
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for freeradius is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4911",
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4911.json"
}
],
"title": "Red Hat Security Advisory: freeradius security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:36+00:00",
"generator": {
"date": "2025-11-06T22:43:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4911",
"initial_release_date": "2024-07-30T09:01:51+00:00",
"revision_history": [
{
"date": "2024-07-30T09:01:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T09:01:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.src",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T09:01:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src",
"7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x",
"7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
RHSA-2024:8577
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8577",
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8577.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:52+00:00",
"generator": {
"date": "2025-11-06T22:44:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8577",
"initial_release_date": "2024-10-29T18:51:38+00:00",
"revision_history": [
{
"date": "2024-10-29T18:51:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-29T18:51:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.19.1-16.el9_0.2.src",
"product": {
"name": "krb5-0:1.19.1-16.el9_0.2.src",
"product_id": "krb5-0:1.19.1-16.el9_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.19.1-16.el9_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product_id": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product_id": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.2.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src"
},
"product_reference": "krb5-0:1.19.1-16.el9_0.2.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-29T18:51:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4936
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4936",
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4936.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:38+00:00",
"generator": {
"date": "2025-11-06T22:43:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4936",
"initial_release_date": "2024-07-31T10:30:35+00:00",
"revision_history": [
{
"date": "2024-07-31T10:30:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T10:30:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=src\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
},
{
"category": "product_version",
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0)",
"product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64\u0026rpmmod=freeradius:3.0:8100020230904084920:69ef70f8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
},
"product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T10:30:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x::freeradius:3.0",
"AppStream-8.10.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_8789
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8789",
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8789.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:01+00:00",
"generator": {
"date": "2024-12-31T03:58:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:8789",
"initial_release_date": "2024-11-04T01:11:07+00:00",
"revision_history": [
{
"date": "2024-11-04T01:11:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T01:11:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.17-19.el8_2.2.src",
"product": {
"name": "krb5-0:1.17-19.el8_2.2.src",
"product_id": "krb5-0:1.17-19.el8_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.17-19.el8_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-devel-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-libs-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.2.i686",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.2.i686",
"product_id": "libkadm5-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product_id": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.17-19.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src"
},
"product_reference": "krb5-0:1.17-19.el8_2.2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T01:11:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686",
"BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_4913
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4913",
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4913.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2024-12-31T03:58:30+00:00",
"generator": {
"date": "2024-12-31T03:58:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:4913",
"initial_release_date": "2024-07-30T08:52:26+00:00",
"revision_history": [
{
"date": "2024-07-30T08:52:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T08:52:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:58:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius:3.0:8020020240726095340:ce27ea5e",
"product": {
"name": "freeradius:3.0:8020020240726095340:ce27ea5e",
"product_id": "freeradius:3.0:8020020240726095340:ce27ea5e",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/freeradius@3.0:8020020240726095340:ce27ea5e"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"product": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
"product_reference": "freeradius:3.0:8020020240726095340:ce27ea5e",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src"
},
"product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T08:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64",
"AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024_9547
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9547",
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9547.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2024-12-31T03:59:59+00:00",
"generator": {
"date": "2024-12-31T03:59:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2024:9547",
"initial_release_date": "2024-11-13T15:58:23+00:00",
"revision_history": [
{
"date": "2024-11-13T15:58:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-13T15:58:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-31T03:59:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product_id": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.21.1-2.el9_4.1.src",
"product": {
"name": "krb5-0:1.21.1-2.el9_4.1.src",
"product_id": "krb5-0:1.21.1-2.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.21.1-2.el9_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src"
},
"product_reference": "krb5-0:1.21.1-2.el9_4.1.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:58:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:4913
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4913",
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4913.json"
}
],
"title": "Red Hat Security Advisory: freeradius:3.0 security update",
"tracking": {
"current_release_date": "2025-11-06T22:43:37+00:00",
"generator": {
"date": "2025-11-06T22:43:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:4913",
"initial_release_date": "2024-07-30T08:52:26+00:00",
"revision_history": [
{
"date": "2024-07-30T08:52:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-30T08:52:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:43:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=src\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
},
{
"category": "product_version",
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product": {
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0)",
"product_id": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64\u0026rpmmod=freeradius:3.0:8020020240726095340:ce27ea5e"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 (freeradius:3.0) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
},
"product_reference": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-30T08:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0",
"AppStream-8.2.0.Z.AUS:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64::freeradius:3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
rhsa-2024:8461
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8461",
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8461.json"
}
],
"title": "Red Hat Security Advisory: krb5 security update",
"tracking": {
"current_release_date": "2025-11-06T22:44:49+00:00",
"generator": {
"date": "2025-11-06T22:44:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:8461",
"initial_release_date": "2024-10-24T17:57:50+00:00",
"revision_history": [
{
"date": "2024-10-24T17:57:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T17:57:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:44:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product_id": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "krb5-0:1.20.1-9.el9_2.2.src",
"product": {
"name": "krb5-0:1.20.1-9.el9_2.2.src",
"product_id": "krb5-0:1.20.1-9.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/krb5@1.20.1-9.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src"
},
"product_reference": "krb5-0:1.20.1-9.el9_2.2.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
},
"product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2024-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2263240"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freeradius: forgery attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "RHBZ#2263240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2865",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"category": "external",
"summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"category": "external",
"summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
"url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
},
{
"category": "external",
"summary": "https://www.blastradius.fail/",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/456537",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"release_date": "2024-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T17:57:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "workaround",
"details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x",
"BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freeradius: forgery attack"
}
]
}
ICSA-24-193-11
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] \nhttps://security.paloaltonetworks.com/",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-364175 from a direct conversion of their vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-364175.json"
},
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-364175.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-11 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-11.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-11 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-11"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens RUGGEDCOM APE 1808",
"tracking": {
"current_release_date": "2025-07-08T00:00:00.000000Z",
"generator": {
"date": "2025-07-10T15:44:54.101181Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-193-11",
"initial_release_date": "2024-07-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-08-13T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added newly published CVE-2024-5913 and CVE-2024-3596"
},
{
"date": "2024-10-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-48795, CVE-2024-3596, CVE-2024-5913 and fix version information for Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices"
},
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added newly published CVE-2024-9468 and CVE-2024-9471. Added CVSSv4.0 vector to CVE-2024-5913"
},
{
"date": "2024-12-10T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added newly published CVE-2024-5920"
},
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added newly published CVE-2025-0114"
},
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added newly published CVE-2025-4231"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0001"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0002"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-5913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-5913"
},
{
"cve": "CVE-2024-5920",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator\u0027s browser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-5920"
},
{
"cve": "CVE-2024-9468",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-9468"
},
{
"cve": "CVE-2024-9471",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-9471"
},
{
"cve": "CVE-2025-0114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0003"
]
}
],
"title": "CVE-2025-0114"
},
{
"cve": "CVE-2025-4231",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\r\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Exposure can be reduced by limiting access to the management interface to trusted internal IP addresses as described in \nPalo Alto Networks\u0027 Security Advisory",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2025-4231"
}
]
}
icsa-25-135-05
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SIPROTEC, SICAM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., a SICAM device) and a RADIUS server, to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details incl. external references can be found in the chapter \"Additional Information\".\nSiemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter \"Additional Information\".\nSiemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter \"Additional Information\" for details.",
"title": "Summary"
},
{
"category": "general",
"text": "Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid\u0027s reliability can thus be minimized by virtue of the grid design.\nSiemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment. \nAs a general security measure Siemens strongly recommends to protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.\n\nRecommended security guidelines can be found at:\nhttps://www.siemens.com/gridsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-794185 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794185.json"
},
{
"category": "self",
"summary": "SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-135-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-135-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-135-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
}
],
"title": "Siemens SIPROTEC and SICAM",
"tracking": {
"current_release_date": "2025-11-11T00:00:00.000000Z",
"generator": {
"date": "2025-11-13T20:52:53.543298Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-135-05",
"initial_release_date": "2025-05-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-05-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-08-12T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added fix for affected firmware modules in SICAM A8000 (CPCI85 for CP-8031/CP-8050, CPC80 for CP-8000/CP-8021/CP-8022, SICORE for CP-8010/CP-8012), SICAM EGS (CPCI85) and SICAM S8000 (SICORE). Added fix for SICAM Q200, for SIPROTEC 5 - CP300 and CP150 Devices, and for SIPROTEC 5 Compact 7SX800 (CP050). Added SICAM AK 3, SICAM BC, SICAM TM, SICAM GridEdge and SIPROTEC 5 - CP200 Devices to the list of known not affected products"
},
{
"date": "2025-11-11T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for SIPROTEC 5 - CP100 Devices"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c16.51",
"product": {
"name": "CPC80 Central Processing/Communication",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "CPC80 Central Processing/Communication"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c6.20",
"product": {
"name": "CPCI85 Central Processing/Communication",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "CPCI85 Central Processing/Communication"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.70",
"product": {
"name": "POWER METER SICAM Q100 family",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "POWER METER SICAM Q100 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.83",
"product": {
"name": "POWER METER SICAM Q200 family",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "POWER METER SICAM Q200 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Powerlink IP",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Powerlink IP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM AK 3",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SICAM AK 3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM BC",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SICAM BC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM GridEdge (Classic)",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SICAM GridEdge (Classic)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM GridEdge Applications for SICAM 8 Platform",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SICAM GridEdge Applications for SICAM 8 Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.50",
"product": {
"name": "SICAM GridPass",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "SICAM GridPass"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICAM TM",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "SICAM TM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.20.0",
"product": {
"name": "SICORE Base system",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "SICORE Base system"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIPROTEC 5 - CP200 Devices",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 - CP200 Devices"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD84 (CP300)",
"product_id": "CSAFPID-0014"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD84 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD85 (CP300)",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD86 (CP300)",
"product_id": "CSAFPID-0016"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MD89 (CP300)",
"product_id": "CSAFPID-0017"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD89 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c9.68",
"product": {
"name": "SIPROTEC 5 6MD89 (CP300) V9.6x",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MD89 (CP300) V9.6x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 6MU85 (CP300)",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 6MU85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7KE85 (CP300)",
"product_id": "CSAFPID-0020"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7KE85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SA82 (CP100)",
"product_id": "CSAFPID-0021"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SA82 (CP150)",
"product_id": "CSAFPID-0022"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SA86 (CP300)",
"product_id": "CSAFPID-0023"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SA87 (CP300)",
"product_id": "CSAFPID-0024"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SA87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SD82 (CP100)",
"product_id": "CSAFPID-0025"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SD82 (CP150)",
"product_id": "CSAFPID-0026"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SD86 (CP300)",
"product_id": "CSAFPID-0027"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SD87 (CP300)",
"product_id": "CSAFPID-0028"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SD87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SJ81 (CP100)",
"product_id": "CSAFPID-0029"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ81 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ81 (CP150)",
"product_id": "CSAFPID-0030"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ81 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SJ82 (CP100)",
"product_id": "CSAFPID-0031"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ82 (CP150)",
"product_id": "CSAFPID-0032"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ85 (CP300)",
"product_id": "CSAFPID-0033"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SJ86 (CP300)",
"product_id": "CSAFPID-0034"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SJ86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SK82 (CP100)",
"product_id": "CSAFPID-0035"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SK82 (CP150)",
"product_id": "CSAFPID-0036"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SK85 (CP300)",
"product_id": "CSAFPID-0037"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SK85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7SL82 (CP100)",
"product_id": "CSAFPID-0038"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SL82 (CP150)",
"product_id": "CSAFPID-0039"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SL86 (CP300)",
"product_id": "CSAFPID-0040"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SL87 (CP300)",
"product_id": "CSAFPID-0041"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SL87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SS85 (CP300)",
"product_id": "CSAFPID-0042"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SS85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7ST85 (CP300)",
"product_id": "CSAFPID-0043"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c9.68",
"product": {
"name": "SIPROTEC 5 7ST85 (CP300) V9.6x",
"product_id": "CSAFPID-0044"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST85 (CP300) V9.6x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7ST86 (CP300)",
"product_id": "CSAFPID-0045"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c9.83",
"product": {
"name": "SIPROTEC 5 7ST86 (CP300) V9.8x",
"product_id": "CSAFPID-0046"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7ST86 (CP300) V9.8x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SX82 (CP150)",
"product_id": "CSAFPID-0047"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SX82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SX85 (CP300)",
"product_id": "CSAFPID-0048"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SX85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7SY82 (CP150)",
"product_id": "CSAFPID-0049"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7SY82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UM85 (CP300)",
"product_id": "CSAFPID-0050"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UM85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c8.90",
"product": {
"name": "SIPROTEC 5 7UT82 (CP100)",
"product_id": "CSAFPID-0051"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT82 (CP100)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT82 (CP150)",
"product_id": "CSAFPID-0052"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT82 (CP150)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT85 (CP300)",
"product_id": "CSAFPID-0053"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT86 (CP300)",
"product_id": "CSAFPID-0054"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT86 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7UT87 (CP300)",
"product_id": "CSAFPID-0055"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7UT87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7VE85 (CP300)",
"product_id": "CSAFPID-0056"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VE85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003e=7.80|\u003c10.0",
"product": {
"name": "SIPROTEC 5 7VK87 (CP300)",
"product_id": "CSAFPID-0057"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VK87 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 7VU85 (CP300)",
"product_id": "CSAFPID-0058"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 7VU85 (CP300)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c10.0",
"product": {
"name": "SIPROTEC 5 Compact 7SX800 (CP050)",
"product_id": "CSAFPID-0059"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5 Compact 7SX800 (CP050)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"CSAFPID-0006",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0007",
"CSAFPID-0011"
]
},
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"CSAFPID-0008"
]
}
],
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059"
],
"known_not_affected": [
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0005"
]
},
{
"category": "vendor_fix",
"details": "Update to V10.0 or later version",
"product_ids": [
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0037",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0048",
"CSAFPID-0050",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814150/"
},
{
"category": "vendor_fix",
"details": "Update to V10.0 or later version",
"product_ids": [
"CSAFPID-0022",
"CSAFPID-0026",
"CSAFPID-0030",
"CSAFPID-0032",
"CSAFPID-0036",
"CSAFPID-0039",
"CSAFPID-0047",
"CSAFPID-0049",
"CSAFPID-0052"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109757433/"
},
{
"category": "vendor_fix",
"details": "Update to V10.0 or later version",
"product_ids": [
"CSAFPID-0059"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109796884/"
},
{
"category": "vendor_fix",
"details": "Update to V16.51 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2.20.0 or later version",
"product_ids": [
"CSAFPID-0012"
]
},
{
"category": "vendor_fix",
"details": "Update to V2.50 or later version",
"product_ids": [
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763384/"
},
{
"category": "vendor_fix",
"details": "Update to V2.70 or later version",
"product_ids": [
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109743524/"
},
{
"category": "vendor_fix",
"details": "Update to V2.83 or later version",
"product_ids": [
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109743592/"
},
{
"category": "vendor_fix",
"details": "Update to V6.20 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V9.68 or later version",
"product_ids": [
"CSAFPID-0018"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109742950/"
},
{
"category": "vendor_fix",
"details": "Update to V9.68 or later version",
"product_ids": [
"CSAFPID-0044"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109740299/"
},
{
"category": "vendor_fix",
"details": "Update to V9.83 or later version",
"product_ids": [
"CSAFPID-0046"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768428/"
},
{
"category": "vendor_fix",
"details": "Update to V8.90 or later V8.xx version",
"product_ids": [
"CSAFPID-0021",
"CSAFPID-0025",
"CSAFPID-0029",
"CSAFPID-0031",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0051"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059"
]
}
],
"threats": [
{
"category": "impact",
"details": "The product does not support the RADIUS protocol.",
"product_ids": [
"CSAFPID-0006",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0007",
"CSAFPID-0011"
]
},
{
"category": "impact",
"details": "The product includes a component which also supports the RADIUS protocol, but the product doesn\u0027t enable or support RADIUS.",
"product_ids": [
"CSAFPID-0008"
]
}
],
"title": "CVE-2024-3596"
}
]
}
icsa-24-193-11
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] \nhttps://security.paloaltonetworks.com/",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-364175 from a direct conversion of their vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-364175.json"
},
{
"category": "self",
"summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-364175.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-11 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-11.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-11 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-11"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens RUGGEDCOM APE 1808",
"tracking": {
"current_release_date": "2025-07-08T00:00:00.000000Z",
"generator": {
"date": "2025-07-10T15:44:54.101181Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-193-11",
"initial_release_date": "2024-07-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-08-13T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added newly published CVE-2024-5913 and CVE-2024-3596"
},
{
"date": "2024-10-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-48795, CVE-2024-3596, CVE-2024-5913 and fix version information for Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices"
},
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added newly published CVE-2024-9468 and CVE-2024-9471. Added CVSSv4.0 vector to CVE-2024-5913"
},
{
"date": "2024-12-10T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added newly published CVE-2024-5920"
},
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added newly published CVE-2025-0114"
},
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added newly published CVE-2025-4231"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0001"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0002"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-5913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-5913"
},
{
"cve": "CVE-2024-5920",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator\u0027s browser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-5920"
},
{
"cve": "CVE-2024-9468",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-9468"
},
{
"cve": "CVE-2024-9471",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-9471"
},
{
"cve": "CVE-2025-0114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0003"
]
}
],
"title": "CVE-2025-0114"
},
{
"cve": "CVE-2025-4231",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\r\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Exposure can be reduced by limiting access to the management interface to trusted internal IP addresses as described in \nPalo Alto Networks\u0027 Security Advisory",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation https://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance.",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2025-4231"
}
]
}
icsa-24-193-05
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details incl. external references can be found in the chapter \"Additional Information\".\nSiemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter \"Additional Information\".\nSiemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter \"Additional Information\" for details.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-723487 from a direct conversion of their vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Communications",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723487.json"
},
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE, RUGGEDCOM, SIPLUS, and SINEC",
"tracking": {
"current_release_date": "2025-07-08T00:00:00.000000Z",
"generator": {
"date": "2025-07-10T15:44:50.971541Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-193-05",
"initial_release_date": "2024-07-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-07-22T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Clarified that the fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants) in V4.1.8 only covers RADIUS client mitigation C1, but not C2"
},
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for RUGGEDCOM CROSSBOW"
},
{
"date": "2024-12-10T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix (and related important recommendations in chapter Additional Information) for RUGGEDCOM ROS V4.x devices; Added additional SINEC OS-based devices as affected products: RUGGEDCOM RST2428P and SCALANCE XC-300, XR-300, XC-400 families, and additional devices in the SCALANCE XR-500 family"
},
{
"date": "2025-01-14T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for SCALANCE W-700 IEEE 802.11ax family and for SCALANCE M-800 family (incl. S615, MUM-800 and RM1224)"
},
{
"date": "2025-03-11T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants)"
},
{
"date": "2025-06-10T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Clarified that SINEC INS is only affected when the Relay feature is used; added fix for the RUGGEDCOM RST2428P, SCALANCE XC-300, SCALANCE XC-400 and SCALANCE XR-300 (6GK5334-xTSxx) families and for some of the devices in the SCALANCE XM-400/XR-500 and SCALANCE XCM-/XRM-/XCH-/XRH-300 families"
},
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added fix for SCALANCE XB-200/XC-200/XP-200/XF-200BA/XR-300WG family, for SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family (MSPS V1.3), for RUGGEDCOM ROS V5.X family and for SINEC INS (relay feature); Clarified the applicability of the MSPS V1.3 and the SINEC OS V3.2 fix releases for product families that support both"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.6",
"product": {
"name": "RUGGEDCOM CROSSBOW",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800NC",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801NC",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802NC",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803NC",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969NC",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100NC",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200",
"product_id": "CSAFPID-0014"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200NC",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30NC",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388 V4.X",
"product_id": "CSAFPID-0020"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388 V5.X",
"product_id": "CSAFPID-0021"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388NC V4.X",
"product_id": "CSAFPID-0022"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388NC V5.X",
"product_id": "CSAFPID-0023"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000",
"product_id": "CSAFPID-0024"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000RE",
"product_id": "CSAFPID-0025"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1400",
"product_id": "CSAFPID-0026"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1500",
"product_id": "CSAFPID-0027"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1501",
"product_id": "CSAFPID-0028"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1510",
"product_id": "CSAFPID-0029"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1511",
"product_id": "CSAFPID-0030"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1512",
"product_id": "CSAFPID-0031"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1524",
"product_id": "CSAFPID-0032"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1536",
"product_id": "CSAFPID-0033"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX5000",
"product_id": "CSAFPID-0034"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110",
"product_id": "CSAFPID-0035"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110NC",
"product_id": "CSAFPID-0036"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400",
"product_id": "CSAFPID-0037"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400NC",
"product_id": "CSAFPID-0038"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401",
"product_id": "CSAFPID-0039"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401NC",
"product_id": "CSAFPID-0040"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416",
"product_id": "CSAFPID-0041"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NC",
"product_id": "CSAFPID-0042"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NCv2 V4.X",
"product_id": "CSAFPID-0043"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416NCv2 V5.X",
"product_id": "CSAFPID-0044"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416P",
"product_id": "CSAFPID-0045"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNC",
"product_id": "CSAFPID-0046"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V4.X",
"product_id": "CSAFPID-0047"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V5.X",
"product_id": "CSAFPID-0048"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416Pv2 V4.X",
"product_id": "CSAFPID-0049"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416Pv2 V5.X",
"product_id": "CSAFPID-0050"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416v2 V4.X",
"product_id": "CSAFPID-0051"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416v2 V5.X",
"product_id": "CSAFPID-0052"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900",
"product_id": "CSAFPID-0053"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900 (32M) V4.X",
"product_id": "CSAFPID-0054"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900 (32M) V5.X",
"product_id": "CSAFPID-0055"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G",
"product_id": "CSAFPID-0056"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G (32M) V4.X",
"product_id": "CSAFPID-0057"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900G (32M) V5.X",
"product_id": "CSAFPID-0058"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC",
"product_id": "CSAFPID-0059"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V4.X",
"product_id": "CSAFPID-0060"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V5.X",
"product_id": "CSAFPID-0061"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GP",
"product_id": "CSAFPID-0062"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GPNC",
"product_id": "CSAFPID-0063"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GPNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900L",
"product_id": "CSAFPID-0064"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900LNC",
"product_id": "CSAFPID-0065"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-C01",
"product_id": "CSAFPID-0066"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-XX",
"product_id": "CSAFPID-0067"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-C01",
"product_id": "CSAFPID-0068"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-XX",
"product_id": "CSAFPID-0069"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-C01",
"product_id": "CSAFPID-0070"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-XX",
"product_id": "CSAFPID-0071"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX",
"product_id": "CSAFPID-0072"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX-C01",
"product_id": "CSAFPID-0073"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC",
"product_id": "CSAFPID-0074"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V4.X",
"product_id": "CSAFPID-0075"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V5.X",
"product_id": "CSAFPID-0076"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900W",
"product_id": "CSAFPID-0077"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910",
"product_id": "CSAFPID-0078"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910L",
"product_id": "CSAFPID-0079"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910LNC",
"product_id": "CSAFPID-0080"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910NC",
"product_id": "CSAFPID-0081"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910W",
"product_id": "CSAFPID-0082"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920L",
"product_id": "CSAFPID-0083"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920LNC",
"product_id": "CSAFPID-0084"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920W",
"product_id": "CSAFPID-0085"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930L",
"product_id": "CSAFPID-0086"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930LNC",
"product_id": "CSAFPID-0087"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930W",
"product_id": "CSAFPID-0088"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940G",
"product_id": "CSAFPID-0089"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940GNC",
"product_id": "CSAFPID-0090"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969",
"product_id": "CSAFPID-0091"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969NC",
"product_id": "CSAFPID-0092"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600",
"product_id": "CSAFPID-0093"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600F",
"product_id": "CSAFPID-0094"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600FNC",
"product_id": "CSAFPID-0095"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600FNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600NC",
"product_id": "CSAFPID-0096"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600T",
"product_id": "CSAFPID-0097"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600TNC",
"product_id": "CSAFPID-0098"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000",
"product_id": "CSAFPID-0099"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000A",
"product_id": "CSAFPID-0100"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000ANC",
"product_id": "CSAFPID-0101"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000ANC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000H",
"product_id": "CSAFPID-0102"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000HNC",
"product_id": "CSAFPID-0103"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000HNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000NC",
"product_id": "CSAFPID-0104"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000T",
"product_id": "CSAFPID-0105"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000TNC",
"product_id": "CSAFPID-0106"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG907R",
"product_id": "CSAFPID-0107"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG908C",
"product_id": "CSAFPID-0108"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG909R",
"product_id": "CSAFPID-0109"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG910C",
"product_id": "CSAFPID-0110"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920P V4.X",
"product_id": "CSAFPID-0111"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920P V5.X",
"product_id": "CSAFPID-0112"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920PNC V4.X",
"product_id": "CSAFPID-0113"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920PNC V5.X",
"product_id": "CSAFPID-0114"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100",
"product_id": "CSAFPID-0115"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V4.X",
"product_id": "CSAFPID-0116"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V5.X",
"product_id": "CSAFPID-0117"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC",
"product_id": "CSAFPID-0118"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V4.X",
"product_id": "CSAFPID-0119"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"product_id": "CSAFPID-0120"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P",
"product_id": "CSAFPID-0121"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V4.X",
"product_id": "CSAFPID-0122"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V5.X",
"product_id": "CSAFPID-0123"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC",
"product_id": "CSAFPID-0124"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X",
"product_id": "CSAFPID-0125"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"product_id": "CSAFPID-0126"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200",
"product_id": "CSAFPID-0127"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200NC",
"product_id": "CSAFPID-0128"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288 V4.X",
"product_id": "CSAFPID-0129"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288 V5.X",
"product_id": "CSAFPID-0130"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288NC V4.X",
"product_id": "CSAFPID-0131"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288NC V5.X",
"product_id": "CSAFPID-0132"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300 V4.X",
"product_id": "CSAFPID-0133"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300 V5.X",
"product_id": "CSAFPID-0134"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300NC V4.X",
"product_id": "CSAFPID-0135"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300NC V5.X",
"product_id": "CSAFPID-0136"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300P V4.X",
"product_id": "CSAFPID-0137"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300P V5.X",
"product_id": "CSAFPID-0138"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300PNC V4.X",
"product_id": "CSAFPID-0139"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300PNC V5.X",
"product_id": "CSAFPID-0140"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488 V4.X",
"product_id": "CSAFPID-0141"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488 V5.X",
"product_id": "CSAFPID-0142"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488NC V4.X",
"product_id": "CSAFPID-0143"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488NC V5.X",
"product_id": "CSAFPID-0144"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910",
"product_id": "CSAFPID-0145"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910NC",
"product_id": "CSAFPID-0146"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916C",
"product_id": "CSAFPID-0147"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916P",
"product_id": "CSAFPID-0148"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228",
"product_id": "CSAFPID-0149"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228P",
"product_id": "CSAFPID-0150"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "CSAFPID-0151",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "CSAFPID-0152",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)",
"product_id": "CSAFPID-0153",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)",
"product_id": "CSAFPID-0154",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)",
"product_id": "CSAFPID-0155",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)",
"product_id": "CSAFPID-0156",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "CSAFPID-0157",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "CSAFPID-0158",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)",
"product_id": "CSAFPID-0159",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2FA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "CSAFPID-0160",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)",
"product_id": "CSAFPID-0161",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "CSAFPID-0162",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "CSAFPID-0163",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "CSAFPID-0164",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "CSAFPID-0165",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)",
"product_id": "CSAFPID-0166",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)",
"product_id": "CSAFPID-0167",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "CSAFPID-0168",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)",
"product_id": "CSAFPID-0169",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)",
"product_id": "CSAFPID-0170",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)",
"product_id": "CSAFPID-0171",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3FA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "CSAFPID-0172",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "CSAFPID-0173",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)",
"product_id": "CSAFPID-0174",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)",
"product_id": "CSAFPID-0175",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)",
"product_id": "CSAFPID-0176",
"product_identification_helper": {
"model_numbers": [
"6GK5622-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)",
"product_id": "CSAFPID-0177",
"product_identification_helper": {
"model_numbers": [
"6GK5626-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)",
"product_id": "CSAFPID-0178",
"product_identification_helper": {
"model_numbers": [
"6GK5632-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)",
"product_id": "CSAFPID-0179",
"product_identification_helper": {
"model_numbers": [
"6GK5636-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)",
"product_id": "CSAFPID-0180",
"product_identification_helper": {
"model_numbers": [
"6GK5642-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)",
"product_id": "CSAFPID-0181",
"product_identification_helper": {
"model_numbers": [
"6GK5646-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)",
"product_id": "CSAFPID-0182",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)",
"product_id": "CSAFPID-0183",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)",
"product_id": "CSAFPID-0184",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)",
"product_id": "CSAFPID-0185",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)",
"product_id": "CSAFPID-0186",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)",
"product_id": "CSAFPID-0187",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)",
"product_id": "CSAFPID-0188",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)",
"product_id": "CSAFPID-0189",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)",
"product_id": "CSAFPID-0190",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)",
"product_id": "CSAFPID-0191",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)",
"product_id": "CSAFPID-0192",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)",
"product_id": "CSAFPID-0193",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)",
"product_id": "CSAFPID-0194",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)",
"product_id": "CSAFPID-0195",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)",
"product_id": "CSAFPID-0196",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)",
"product_id": "CSAFPID-0197",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)",
"product_id": "CSAFPID-0198",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)",
"product_id": "CSAFPID-0199",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)",
"product_id": "CSAFPID-0200",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)",
"product_id": "CSAFPID-0201",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)",
"product_id": "CSAFPID-0202",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)",
"product_id": "CSAFPID-0203",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)",
"product_id": "CSAFPID-0204",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)",
"product_id": "CSAFPID-0205",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)",
"product_id": "CSAFPID-0206",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)",
"product_id": "CSAFPID-0207",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)",
"product_id": "CSAFPID-0208",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)",
"product_id": "CSAFPID-0209",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)",
"product_id": "CSAFPID-0210",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)",
"product_id": "CSAFPID-0211",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)",
"product_id": "CSAFPID-0212",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)",
"product_id": "CSAFPID-0213",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)",
"product_id": "CSAFPID-0214",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)",
"product_id": "CSAFPID-0215",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)",
"product_id": "CSAFPID-0216",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)",
"product_id": "CSAFPID-0217",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)",
"product_id": "CSAFPID-0218",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)",
"product_id": "CSAFPID-0219",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)",
"product_id": "CSAFPID-0220",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)",
"product_id": "CSAFPID-0221",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)",
"product_id": "CSAFPID-0222",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)",
"product_id": "CSAFPID-0223",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)",
"product_id": "CSAFPID-0224",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)",
"product_id": "CSAFPID-0225",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)",
"product_id": "CSAFPID-0226",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)",
"product_id": "CSAFPID-0227",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)",
"product_id": "CSAFPID-0228",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)",
"product_id": "CSAFPID-0229",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)",
"product_id": "CSAFPID-0230",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "CSAFPID-0231",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "CSAFPID-0232",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "CSAFPID-0233",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "CSAFPID-0234",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "CSAFPID-0235",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "CSAFPID-0236",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)",
"product_id": "CSAFPID-0237",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-6AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "CSAFPID-0238",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)",
"product_id": "CSAFPID-0239",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)",
"product_id": "CSAFPID-0240",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)",
"product_id": "CSAFPID-0241",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)",
"product_id": "CSAFPID-0242",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "CSAFPID-0243",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)",
"product_id": "CSAFPID-0244",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)",
"product_id": "CSAFPID-0245",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "CSAFPID-0246",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)",
"product_id": "CSAFPID-0247",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)",
"product_id": "CSAFPID-0248",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-2AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "CSAFPID-0249",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "CSAFPID-0250",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)",
"product_id": "CSAFPID-0251",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)",
"product_id": "CSAFPID-0252",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)",
"product_id": "CSAFPID-0253",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)",
"product_id": "CSAFPID-0254",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)",
"product_id": "CSAFPID-0255",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)",
"product_id": "CSAFPID-0256",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)",
"product_id": "CSAFPID-0257",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)",
"product_id": "CSAFPID-0258",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)",
"product_id": "CSAFPID-0259",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)",
"product_id": "CSAFPID-0260",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)",
"product_id": "CSAFPID-0261",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)",
"product_id": "CSAFPID-0262",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)",
"product_id": "CSAFPID-0263",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)",
"product_id": "CSAFPID-0264",
"product_identification_helper": {
"model_numbers": [
"6GK5304-2BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)",
"product_id": "CSAFPID-0265",
"product_identification_helper": {
"model_numbers": [
"6GK5306-1BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)",
"product_id": "CSAFPID-0266",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)",
"product_id": "CSAFPID-0267",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)",
"product_id": "CSAFPID-0268",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)",
"product_id": "CSAFPID-0269",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)",
"product_id": "CSAFPID-0270",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)",
"product_id": "CSAFPID-0271",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)",
"product_id": "CSAFPID-0272",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)",
"product_id": "CSAFPID-0273",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)",
"product_id": "CSAFPID-0274",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)",
"product_id": "CSAFPID-0275",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)",
"product_id": "CSAFPID-0276",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)",
"product_id": "CSAFPID-0277",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)",
"product_id": "CSAFPID-0278",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)",
"product_id": "CSAFPID-0279",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)",
"product_id": "CSAFPID-0280",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)",
"product_id": "CSAFPID-0281",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)",
"product_id": "CSAFPID-0282",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)",
"product_id": "CSAFPID-0283",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)",
"product_id": "CSAFPID-0284",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)",
"product_id": "CSAFPID-0285",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)",
"product_id": "CSAFPID-0286",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)",
"product_id": "CSAFPID-0287",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)",
"product_id": "CSAFPID-0288",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)",
"product_id": "CSAFPID-0289",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)",
"product_id": "CSAFPID-0290",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)",
"product_id": "CSAFPID-0291",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)",
"product_id": "CSAFPID-0292",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)",
"product_id": "CSAFPID-0293",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)",
"product_id": "CSAFPID-0294",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)",
"product_id": "CSAFPID-0295",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)",
"product_id": "CSAFPID-0296",
"product_identification_helper": {
"model_numbers": [
"6GK5320-1BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)",
"product_id": "CSAFPID-0297",
"product_identification_helper": {
"model_numbers": [
"6GK5320-3BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)",
"product_id": "CSAFPID-0298",
"product_identification_helper": {
"model_numbers": [
"6GK5408-2FD00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)",
"product_id": "CSAFPID-0299",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)",
"product_id": "CSAFPID-0300",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)",
"product_id": "CSAFPID-0301",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)",
"product_id": "CSAFPID-0302",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)",
"product_id": "CSAFPID-0303",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)",
"product_id": "CSAFPID-0304",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)",
"product_id": "CSAFPID-0305",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)",
"product_id": "CSAFPID-0306",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)",
"product_id": "CSAFPID-0307",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)",
"product_id": "CSAFPID-0308",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)",
"product_id": "CSAFPID-0309",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)",
"product_id": "CSAFPID-0310",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)",
"product_id": "CSAFPID-0311",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)",
"product_id": "CSAFPID-0312",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)",
"product_id": "CSAFPID-0313",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)",
"product_id": "CSAFPID-0314",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)",
"product_id": "CSAFPID-0315",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)",
"product_id": "CSAFPID-0316",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)",
"product_id": "CSAFPID-0317",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)",
"product_id": "CSAFPID-0318",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)",
"product_id": "CSAFPID-0319",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)",
"product_id": "CSAFPID-0320",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)",
"product_id": "CSAFPID-0321",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)",
"product_id": "CSAFPID-0322",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)",
"product_id": "CSAFPID-0323",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)",
"product_id": "CSAFPID-0324",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)",
"product_id": "CSAFPID-0325",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)",
"product_id": "CSAFPID-0326",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)",
"product_id": "CSAFPID-0327",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)",
"product_id": "CSAFPID-0328",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)",
"product_id": "CSAFPID-0329",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)",
"product_id": "CSAFPID-0330",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)",
"product_id": "CSAFPID-0331",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)",
"product_id": "CSAFPID-0332",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)",
"product_id": "CSAFPID-0333",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)",
"product_id": "CSAFPID-0334",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)",
"product_id": "CSAFPID-0335",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)",
"product_id": "CSAFPID-0336",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)",
"product_id": "CSAFPID-0337",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)",
"product_id": "CSAFPID-0338",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)",
"product_id": "CSAFPID-0339",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)",
"product_id": "CSAFPID-0340",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)",
"product_id": "CSAFPID-0341",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)",
"product_id": "CSAFPID-0342",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)",
"product_id": "CSAFPID-0343",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)",
"product_id": "CSAFPID-0344",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)",
"product_id": "CSAFPID-0345",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)",
"product_id": "CSAFPID-0346",
"product_identification_helper": {
"model_numbers": [
"6GK5224-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)",
"product_id": "CSAFPID-0347",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)",
"product_id": "CSAFPID-0348",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)",
"product_id": "CSAFPID-0349",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)",
"product_id": "CSAFPID-0350",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)",
"product_id": "CSAFPID-0351",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)",
"product_id": "CSAFPID-0352",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)",
"product_id": "CSAFPID-0353",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)",
"product_id": "CSAFPID-0354",
"product_identification_helper": {
"model_numbers": [
"6GK5424-8TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)",
"product_id": "CSAFPID-0355",
"product_identification_helper": {
"model_numbers": [
"6GK5428-4TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)",
"product_id": "CSAFPID-0356",
"product_identification_helper": {
"model_numbers": [
"6GK5432-0GR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)",
"product_id": "CSAFPID-0357",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)",
"product_id": "CSAFPID-0358",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)",
"product_id": "CSAFPID-0359",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)",
"product_id": "CSAFPID-0360",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)",
"product_id": "CSAFPID-0361",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)",
"product_id": "CSAFPID-0362",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)",
"product_id": "CSAFPID-0363",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)",
"product_id": "CSAFPID-0364",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)",
"product_id": "CSAFPID-0365",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0GA00-1UF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)",
"product_id": "CSAFPID-0366",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GP00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)",
"product_id": "CSAFPID-0367",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GQ00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)",
"product_id": "CSAFPID-0368",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)",
"product_id": "CSAFPID-0369",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)",
"product_id": "CSAFPID-0370",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)",
"product_id": "CSAFPID-0371",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)",
"product_id": "CSAFPID-0372",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)",
"product_id": "CSAFPID-0373",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)",
"product_id": "CSAFPID-0374",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)",
"product_id": "CSAFPID-0375",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)",
"product_id": "CSAFPID-0376",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)",
"product_id": "CSAFPID-0377",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)",
"product_id": "CSAFPID-0378",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)",
"product_id": "CSAFPID-0379",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)",
"product_id": "CSAFPID-0380",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0JA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)",
"product_id": "CSAFPID-0381",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)",
"product_id": "CSAFPID-0382",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)",
"product_id": "CSAFPID-0383",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)",
"product_id": "CSAFPID-0384",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)",
"product_id": "CSAFPID-0385",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)",
"product_id": "CSAFPID-0386",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)",
"product_id": "CSAFPID-0387",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)",
"product_id": "CSAFPID-0388",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)",
"product_id": "CSAFPID-0389",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)",
"product_id": "CSAFPID-0390",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)",
"product_id": "CSAFPID-0391",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)",
"product_id": "CSAFPID-0392",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)",
"product_id": "CSAFPID-0393",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)",
"product_id": "CSAFPID-0394",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)",
"product_id": "CSAFPID-0395",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)",
"product_id": "CSAFPID-0396",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)",
"product_id": "CSAFPID-0397",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)",
"product_id": "CSAFPID-0398",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)",
"product_id": "CSAFPID-0399",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)",
"product_id": "CSAFPID-0400",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)",
"product_id": "CSAFPID-0401",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)",
"product_id": "CSAFPID-0402",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)",
"product_id": "CSAFPID-0403",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)",
"product_id": "CSAFPID-0404",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)",
"product_id": "CSAFPID-0405",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)",
"product_id": "CSAFPID-0406",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)",
"product_id": "CSAFPID-0407",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)",
"product_id": "CSAFPID-0408",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)",
"product_id": "CSAFPID-0409",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)",
"product_id": "CSAFPID-0410",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)",
"product_id": "CSAFPID-0411",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)",
"product_id": "CSAFPID-0412",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)",
"product_id": "CSAFPID-0413",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)",
"product_id": "CSAFPID-0414",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)",
"product_id": "CSAFPID-0415",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)",
"product_id": "CSAFPID-0416",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)",
"product_id": "CSAFPID-0417",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)",
"product_id": "CSAFPID-0418",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)",
"product_id": "CSAFPID-0419",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)",
"product_id": "CSAFPID-0420",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)",
"product_id": "CSAFPID-0421",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)",
"product_id": "CSAFPID-0422",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)",
"product_id": "CSAFPID-0423",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)",
"product_id": "CSAFPID-0424",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)",
"product_id": "CSAFPID-0425",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)",
"product_id": "CSAFPID-0426",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)",
"product_id": "CSAFPID-0427",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)",
"product_id": "CSAFPID-0428",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)",
"product_id": "CSAFPID-0429",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)",
"product_id": "CSAFPID-0430",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)",
"product_id": "CSAFPID-0431",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)",
"product_id": "CSAFPID-0432",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)",
"product_id": "CSAFPID-0433",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)",
"product_id": "CSAFPID-0434",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)",
"product_id": "CSAFPID-0435",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)",
"product_id": "CSAFPID-0436",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)",
"product_id": "CSAFPID-0437",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)",
"product_id": "CSAFPID-0438",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)",
"product_id": "CSAFPID-0439",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)",
"product_id": "CSAFPID-0440",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)",
"product_id": "CSAFPID-0441",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)",
"product_id": "CSAFPID-0442",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)",
"product_id": "CSAFPID-0443",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)",
"product_id": "CSAFPID-0444",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)",
"product_id": "CSAFPID-0445",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)",
"product_id": "CSAFPID-0446",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)",
"product_id": "CSAFPID-0447",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)",
"product_id": "CSAFPID-0448",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)",
"product_id": "CSAFPID-0449",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)",
"product_id": "CSAFPID-0450",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)",
"product_id": "CSAFPID-0451",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)",
"product_id": "CSAFPID-0452",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)",
"product_id": "CSAFPID-0453",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)",
"product_id": "CSAFPID-0454",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)",
"product_id": "CSAFPID-0455",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)",
"product_id": "CSAFPID-0456",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)",
"product_id": "CSAFPID-0457",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)",
"product_id": "CSAFPID-0458",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)",
"product_id": "CSAFPID-0459",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)",
"product_id": "CSAFPID-0460",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)",
"product_id": "CSAFPID-0461",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)",
"product_id": "CSAFPID-0462",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)",
"product_id": "CSAFPID-0463",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)",
"product_id": "CSAFPID-0464",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)",
"product_id": "CSAFPID-0465",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)",
"product_id": "CSAFPID-0466",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)",
"product_id": "CSAFPID-0467",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)",
"product_id": "CSAFPID-0468",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)",
"product_id": "CSAFPID-0469",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)",
"product_id": "CSAFPID-0470",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)",
"product_id": "CSAFPID-0471",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)",
"product_id": "CSAFPID-0472",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)",
"product_id": "CSAFPID-0473",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)",
"product_id": "CSAFPID-0474",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)",
"product_id": "CSAFPID-0475",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)",
"product_id": "CSAFPID-0476",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)",
"product_id": "CSAFPID-0477",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)",
"product_id": "CSAFPID-0478",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)",
"product_id": "CSAFPID-0479",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)",
"product_id": "CSAFPID-0480",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)",
"product_id": "CSAFPID-0481",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)",
"product_id": "CSAFPID-0482",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)",
"product_id": "CSAFPID-0483",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)",
"product_id": "CSAFPID-0484",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)",
"product_id": "CSAFPID-0485",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)",
"product_id": "CSAFPID-0486",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)",
"product_id": "CSAFPID-0487",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)",
"product_id": "CSAFPID-0488",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)",
"product_id": "CSAFPID-0489",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)",
"product_id": "CSAFPID-0490",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)",
"product_id": "CSAFPID-0491",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.0_SP2_Update_4_only_when_the_Relay_feature_is_enabled",
"product": {
"name": "SINEC INS",
"product_id": "CSAFPID-0492"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)",
"product_id": "CSAFPID-0493",
"product_identification_helper": {
"model_numbers": [
"6AG1308-2FL10-4AA3"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)",
"product_id": "CSAFPID-0494",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BB00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)",
"product_id": "CSAFPID-0495",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)",
"product_id": "CSAFPID-0496",
"product_identification_helper": {
"model_numbers": [
"6AG1208-0BA00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)",
"product_id": "CSAFPID-0497",
"product_identification_helper": {
"model_numbers": [
"6AG1216-4BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP2 Update 4 or later version",
"product_ids": [
"CSAFPID-0492"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.3 or later version",
"product_ids": [
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977441/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977720/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"CSAFPID-0151",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"CSAFPID-0360"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1.9 or later version",
"product_ids": [
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0493"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109982245/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0020",
"CSAFPID-0022",
"CSAFPID-0035",
"CSAFPID-0037",
"CSAFPID-0039",
"CSAFPID-0041",
"CSAFPID-0049",
"CSAFPID-0051",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0062",
"CSAFPID-0064",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0091",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0097",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0102",
"CSAFPID-0105",
"CSAFPID-0111",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0119",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0127",
"CSAFPID-0129",
"CSAFPID-0133",
"CSAFPID-0137",
"CSAFPID-0141"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0036",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0084",
"CSAFPID-0087",
"CSAFPID-0090",
"CSAFPID-0092",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0098",
"CSAFPID-0101",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0106",
"CSAFPID-0113",
"CSAFPID-0118",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0128",
"CSAFPID-0131",
"CSAFPID-0135",
"CSAFPID-0139",
"CSAFPID-0143"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.6 or later version",
"product_ids": [
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977185/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0021",
"CSAFPID-0050",
"CSAFPID-0052",
"CSAFPID-0055",
"CSAFPID-0058",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0112",
"CSAFPID-0117",
"CSAFPID-0123",
"CSAFPID-0130",
"CSAFPID-0134",
"CSAFPID-0138",
"CSAFPID-0142",
"CSAFPID-0145",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0023",
"CSAFPID-0044",
"CSAFPID-0048",
"CSAFPID-0061",
"CSAFPID-0076",
"CSAFPID-0114",
"CSAFPID-0120",
"CSAFPID-0126",
"CSAFPID-0132",
"CSAFPID-0136",
"CSAFPID-0140",
"CSAFPID-0144",
"CSAFPID-0146"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.6 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976555/"
},
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
}
],
"title": "CVE-2024-3596"
}
]
}
ICSA-24-193-05
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details incl. external references can be found in the chapter \"Additional Information\".\nSiemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter \"Additional Information\".\nSiemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter \"Additional Information\" for details.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-723487 from a direct conversion of their vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Communications",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723487.json"
},
{
"category": "self",
"summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-193-05 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE, RUGGEDCOM, SIPLUS, and SINEC",
"tracking": {
"current_release_date": "2025-07-08T00:00:00.000000Z",
"generator": {
"date": "2025-07-10T15:44:50.971541Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-193-05",
"initial_release_date": "2024-07-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-07-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-07-22T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Clarified that the fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants) in V4.1.8 only covers RADIUS client mitigation C1, but not C2"
},
{
"date": "2024-11-12T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for RUGGEDCOM CROSSBOW"
},
{
"date": "2024-12-10T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix (and related important recommendations in chapter Additional Information) for RUGGEDCOM ROS V4.x devices; Added additional SINEC OS-based devices as affected products: RUGGEDCOM RST2428P and SCALANCE XC-300, XR-300, XC-400 families, and additional devices in the SCALANCE XR-500 family"
},
{
"date": "2025-01-14T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for SCALANCE W-700 IEEE 802.11ax family and for SCALANCE M-800 family (incl. S615, MUM-800 and RM1224)"
},
{
"date": "2025-03-11T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants)"
},
{
"date": "2025-06-10T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Clarified that SINEC INS is only affected when the Relay feature is used; added fix for the RUGGEDCOM RST2428P, SCALANCE XC-300, SCALANCE XC-400 and SCALANCE XR-300 (6GK5334-xTSxx) families and for some of the devices in the SCALANCE XM-400/XR-500 and SCALANCE XCM-/XRM-/XCH-/XRH-300 families"
},
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added fix for SCALANCE XB-200/XC-200/XP-200/XF-200BA/XR-300WG family, for SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family (MSPS V1.3), for RUGGEDCOM ROS V5.X family and for SINEC INS (relay feature); Clarified the applicability of the MSPS V1.3 and the SINEC OS V3.2 fix releases for product families that support both"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.6",
"product": {
"name": "RUGGEDCOM CROSSBOW",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i800NC",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i801NC",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i802NC",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM i803NC",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M969NC",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2100NC",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200",
"product_id": "CSAFPID-0014"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM M2200NC",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC30NC",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388 V4.X",
"product_id": "CSAFPID-0020"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388 V5.X",
"product_id": "CSAFPID-0021"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RMC8388NC V4.X",
"product_id": "CSAFPID-0022"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388NC V5.X",
"product_id": "CSAFPID-0023"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000",
"product_id": "CSAFPID-0024"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX MX5000RE",
"product_id": "CSAFPID-0025"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1400",
"product_id": "CSAFPID-0026"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1500",
"product_id": "CSAFPID-0027"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1501",
"product_id": "CSAFPID-0028"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1510",
"product_id": "CSAFPID-0029"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1511",
"product_id": "CSAFPID-0030"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1512",
"product_id": "CSAFPID-0031"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1524",
"product_id": "CSAFPID-0032"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX1536",
"product_id": "CSAFPID-0033"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROX RX5000",
"product_id": "CSAFPID-0034"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110",
"product_id": "CSAFPID-0035"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RP110NC",
"product_id": "CSAFPID-0036"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400",
"product_id": "CSAFPID-0037"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS400NC",
"product_id": "CSAFPID-0038"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401",
"product_id": "CSAFPID-0039"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS401NC",
"product_id": "CSAFPID-0040"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416",
"product_id": "CSAFPID-0041"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NC",
"product_id": "CSAFPID-0042"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416NCv2 V4.X",
"product_id": "CSAFPID-0043"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416NCv2 V5.X",
"product_id": "CSAFPID-0044"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416P",
"product_id": "CSAFPID-0045"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNC",
"product_id": "CSAFPID-0046"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V4.X",
"product_id": "CSAFPID-0047"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V5.X",
"product_id": "CSAFPID-0048"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416Pv2 V4.X",
"product_id": "CSAFPID-0049"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416Pv2 V5.X",
"product_id": "CSAFPID-0050"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS416v2 V4.X",
"product_id": "CSAFPID-0051"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS416v2 V5.X",
"product_id": "CSAFPID-0052"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900",
"product_id": "CSAFPID-0053"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900 (32M) V4.X",
"product_id": "CSAFPID-0054"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900 (32M) V5.X",
"product_id": "CSAFPID-0055"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G",
"product_id": "CSAFPID-0056"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900G (32M) V4.X",
"product_id": "CSAFPID-0057"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900G (32M) V5.X",
"product_id": "CSAFPID-0058"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC",
"product_id": "CSAFPID-0059"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V4.X",
"product_id": "CSAFPID-0060"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V5.X",
"product_id": "CSAFPID-0061"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GP",
"product_id": "CSAFPID-0062"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900GPNC",
"product_id": "CSAFPID-0063"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GPNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900L",
"product_id": "CSAFPID-0064"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900LNC",
"product_id": "CSAFPID-0065"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-C01",
"product_id": "CSAFPID-0066"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-GETS-XX",
"product_id": "CSAFPID-0067"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-C01",
"product_id": "CSAFPID-0068"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900M-STND-XX",
"product_id": "CSAFPID-0069"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-C01",
"product_id": "CSAFPID-0070"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-GETS-XX",
"product_id": "CSAFPID-0071"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX",
"product_id": "CSAFPID-0072"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900MNC-STND-XX-C01",
"product_id": "CSAFPID-0073"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900MNC-STND-XX-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC",
"product_id": "CSAFPID-0074"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V4.X",
"product_id": "CSAFPID-0075"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V5.X",
"product_id": "CSAFPID-0076"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS900W",
"product_id": "CSAFPID-0077"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910",
"product_id": "CSAFPID-0078"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910L",
"product_id": "CSAFPID-0079"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910LNC",
"product_id": "CSAFPID-0080"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910NC",
"product_id": "CSAFPID-0081"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS910W",
"product_id": "CSAFPID-0082"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920L",
"product_id": "CSAFPID-0083"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920LNC",
"product_id": "CSAFPID-0084"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS920W",
"product_id": "CSAFPID-0085"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930L",
"product_id": "CSAFPID-0086"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930LNC",
"product_id": "CSAFPID-0087"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930LNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS930W",
"product_id": "CSAFPID-0088"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940G",
"product_id": "CSAFPID-0089"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS940GNC",
"product_id": "CSAFPID-0090"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940GNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969",
"product_id": "CSAFPID-0091"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS969NC",
"product_id": "CSAFPID-0092"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600",
"product_id": "CSAFPID-0093"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600F",
"product_id": "CSAFPID-0094"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600FNC",
"product_id": "CSAFPID-0095"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600FNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600NC",
"product_id": "CSAFPID-0096"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600T",
"product_id": "CSAFPID-0097"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS1600TNC",
"product_id": "CSAFPID-0098"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000",
"product_id": "CSAFPID-0099"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000A",
"product_id": "CSAFPID-0100"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000ANC",
"product_id": "CSAFPID-0101"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000ANC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000H",
"product_id": "CSAFPID-0102"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000HNC",
"product_id": "CSAFPID-0103"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000HNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000NC",
"product_id": "CSAFPID-0104"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000T",
"product_id": "CSAFPID-0105"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RS8000TNC",
"product_id": "CSAFPID-0106"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000TNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG907R",
"product_id": "CSAFPID-0107"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG908C",
"product_id": "CSAFPID-0108"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG909R",
"product_id": "CSAFPID-0109"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG910C",
"product_id": "CSAFPID-0110"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920P V4.X",
"product_id": "CSAFPID-0111"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920P V5.X",
"product_id": "CSAFPID-0112"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG920PNC V4.X",
"product_id": "CSAFPID-0113"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG920PNC V5.X",
"product_id": "CSAFPID-0114"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100",
"product_id": "CSAFPID-0115"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V4.X",
"product_id": "CSAFPID-0116"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V5.X",
"product_id": "CSAFPID-0117"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC",
"product_id": "CSAFPID-0118"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V4.X",
"product_id": "CSAFPID-0119"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"product_id": "CSAFPID-0120"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P",
"product_id": "CSAFPID-0121"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V4.X",
"product_id": "CSAFPID-0122"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V5.X",
"product_id": "CSAFPID-0123"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC",
"product_id": "CSAFPID-0124"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X",
"product_id": "CSAFPID-0125"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"product_id": "CSAFPID-0126"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200",
"product_id": "CSAFPID-0127"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2200NC",
"product_id": "CSAFPID-0128"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288 V4.X",
"product_id": "CSAFPID-0129"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288 V5.X",
"product_id": "CSAFPID-0130"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2288NC V4.X",
"product_id": "CSAFPID-0131"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288NC V5.X",
"product_id": "CSAFPID-0132"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300 V4.X",
"product_id": "CSAFPID-0133"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300 V5.X",
"product_id": "CSAFPID-0134"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300NC V4.X",
"product_id": "CSAFPID-0135"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300NC V5.X",
"product_id": "CSAFPID-0136"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300P V4.X",
"product_id": "CSAFPID-0137"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300P V5.X",
"product_id": "CSAFPID-0138"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2300PNC V4.X",
"product_id": "CSAFPID-0139"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300PNC V5.X",
"product_id": "CSAFPID-0140"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488 V4.X",
"product_id": "CSAFPID-0141"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488 V5.X",
"product_id": "CSAFPID-0142"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.3.11",
"product": {
"name": "RUGGEDCOM RSG2488NC V4.X",
"product_id": "CSAFPID-0143"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488NC V5.X",
"product_id": "CSAFPID-0144"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910",
"product_id": "CSAFPID-0145"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RSL910NC",
"product_id": "CSAFPID-0146"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916C",
"product_id": "CSAFPID-0147"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST916P",
"product_id": "CSAFPID-0148"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228",
"product_id": "CSAFPID-0149"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV5.10.0",
"product": {
"name": "RUGGEDCOM RST2228P",
"product_id": "CSAFPID-0150"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "CSAFPID-0151",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "CSAFPID-0152",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)",
"product_id": "CSAFPID-0153",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)",
"product_id": "CSAFPID-0154",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)",
"product_id": "CSAFPID-0155",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)",
"product_id": "CSAFPID-0156",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "CSAFPID-0157",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "CSAFPID-0158",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)",
"product_id": "CSAFPID-0159",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2FA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "CSAFPID-0160",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)",
"product_id": "CSAFPID-0161",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "CSAFPID-0162",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "CSAFPID-0163",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "CSAFPID-0164",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "CSAFPID-0165",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)",
"product_id": "CSAFPID-0166",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)",
"product_id": "CSAFPID-0167",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA10-2BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "CSAFPID-0168",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)",
"product_id": "CSAFPID-0169",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)",
"product_id": "CSAFPID-0170",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA10-3BA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)",
"product_id": "CSAFPID-0171",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3FA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "CSAFPID-0172",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "CSAFPID-0173",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)",
"product_id": "CSAFPID-0174",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV8.2",
"product": {
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)",
"product_id": "CSAFPID-0175",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)",
"product_id": "CSAFPID-0176",
"product_identification_helper": {
"model_numbers": [
"6GK5622-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)",
"product_id": "CSAFPID-0177",
"product_identification_helper": {
"model_numbers": [
"6GK5626-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)",
"product_id": "CSAFPID-0178",
"product_identification_helper": {
"model_numbers": [
"6GK5632-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)",
"product_id": "CSAFPID-0179",
"product_identification_helper": {
"model_numbers": [
"6GK5636-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)",
"product_id": "CSAFPID-0180",
"product_identification_helper": {
"model_numbers": [
"6GK5642-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)",
"product_id": "CSAFPID-0181",
"product_identification_helper": {
"model_numbers": [
"6GK5646-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)",
"product_id": "CSAFPID-0182",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)",
"product_id": "CSAFPID-0183",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)",
"product_id": "CSAFPID-0184",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)",
"product_id": "CSAFPID-0185",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)",
"product_id": "CSAFPID-0186",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)",
"product_id": "CSAFPID-0187",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)",
"product_id": "CSAFPID-0188",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)",
"product_id": "CSAFPID-0189",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)",
"product_id": "CSAFPID-0190",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)",
"product_id": "CSAFPID-0191",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)",
"product_id": "CSAFPID-0192",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)",
"product_id": "CSAFPID-0193",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)",
"product_id": "CSAFPID-0194",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)",
"product_id": "CSAFPID-0195",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)",
"product_id": "CSAFPID-0196",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)",
"product_id": "CSAFPID-0197",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)",
"product_id": "CSAFPID-0198",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)",
"product_id": "CSAFPID-0199",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)",
"product_id": "CSAFPID-0200",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)",
"product_id": "CSAFPID-0201",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)",
"product_id": "CSAFPID-0202",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)",
"product_id": "CSAFPID-0203",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)",
"product_id": "CSAFPID-0204",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)",
"product_id": "CSAFPID-0205",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)",
"product_id": "CSAFPID-0206",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)",
"product_id": "CSAFPID-0207",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)",
"product_id": "CSAFPID-0208",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)",
"product_id": "CSAFPID-0209",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)",
"product_id": "CSAFPID-0210",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)",
"product_id": "CSAFPID-0211",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)",
"product_id": "CSAFPID-0212",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)",
"product_id": "CSAFPID-0213",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)",
"product_id": "CSAFPID-0214",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)",
"product_id": "CSAFPID-0215",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)",
"product_id": "CSAFPID-0216",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)",
"product_id": "CSAFPID-0217",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)",
"product_id": "CSAFPID-0218",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)",
"product_id": "CSAFPID-0219",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)",
"product_id": "CSAFPID-0220",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)",
"product_id": "CSAFPID-0221",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)",
"product_id": "CSAFPID-0222",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)",
"product_id": "CSAFPID-0223",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)",
"product_id": "CSAFPID-0224",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)",
"product_id": "CSAFPID-0225",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)",
"product_id": "CSAFPID-0226",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)",
"product_id": "CSAFPID-0227",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)",
"product_id": "CSAFPID-0228",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)",
"product_id": "CSAFPID-0229",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)",
"product_id": "CSAFPID-0230",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "CSAFPID-0231",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "CSAFPID-0232",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "CSAFPID-0233",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "CSAFPID-0234",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "CSAFPID-0235",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "CSAFPID-0236",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)",
"product_id": "CSAFPID-0237",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-6AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "CSAFPID-0238",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)",
"product_id": "CSAFPID-0239",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)",
"product_id": "CSAFPID-0240",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)",
"product_id": "CSAFPID-0241",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)",
"product_id": "CSAFPID-0242",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "CSAFPID-0243",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)",
"product_id": "CSAFPID-0244",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)",
"product_id": "CSAFPID-0245",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "CSAFPID-0246",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)",
"product_id": "CSAFPID-0247",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)",
"product_id": "CSAFPID-0248",
"product_identification_helper": {
"model_numbers": [
"6GK5762-1AJ00-2AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "CSAFPID-0249",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "CSAFPID-0250",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)",
"product_id": "CSAFPID-0251",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)",
"product_id": "CSAFPID-0252",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)",
"product_id": "CSAFPID-0253",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)",
"product_id": "CSAFPID-0254",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.0.0",
"product": {
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)",
"product_id": "CSAFPID-0255",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)",
"product_id": "CSAFPID-0256",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)",
"product_id": "CSAFPID-0257",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)",
"product_id": "CSAFPID-0258",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)",
"product_id": "CSAFPID-0259",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)",
"product_id": "CSAFPID-0260",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)",
"product_id": "CSAFPID-0261",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)",
"product_id": "CSAFPID-0262",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)",
"product_id": "CSAFPID-0263",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)",
"product_id": "CSAFPID-0264",
"product_identification_helper": {
"model_numbers": [
"6GK5304-2BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)",
"product_id": "CSAFPID-0265",
"product_identification_helper": {
"model_numbers": [
"6GK5306-1BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)",
"product_id": "CSAFPID-0266",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)",
"product_id": "CSAFPID-0267",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)",
"product_id": "CSAFPID-0268",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)",
"product_id": "CSAFPID-0269",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)",
"product_id": "CSAFPID-0270",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)",
"product_id": "CSAFPID-0271",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)",
"product_id": "CSAFPID-0272",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)",
"product_id": "CSAFPID-0273",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)",
"product_id": "CSAFPID-0274",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)",
"product_id": "CSAFPID-0275",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)",
"product_id": "CSAFPID-0276",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)",
"product_id": "CSAFPID-0277",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)",
"product_id": "CSAFPID-0278",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)",
"product_id": "CSAFPID-0279",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)",
"product_id": "CSAFPID-0280",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)",
"product_id": "CSAFPID-0281",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)",
"product_id": "CSAFPID-0282",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)",
"product_id": "CSAFPID-0283",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)",
"product_id": "CSAFPID-0284",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)",
"product_id": "CSAFPID-0285",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)",
"product_id": "CSAFPID-0286",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)",
"product_id": "CSAFPID-0287",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)",
"product_id": "CSAFPID-0288",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)",
"product_id": "CSAFPID-0289",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)",
"product_id": "CSAFPID-0290",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)",
"product_id": "CSAFPID-0291",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)",
"product_id": "CSAFPID-0292",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)",
"product_id": "CSAFPID-0293",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)",
"product_id": "CSAFPID-0294",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)",
"product_id": "CSAFPID-0295",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)",
"product_id": "CSAFPID-0296",
"product_identification_helper": {
"model_numbers": [
"6GK5320-1BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)",
"product_id": "CSAFPID-0297",
"product_identification_helper": {
"model_numbers": [
"6GK5320-3BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)",
"product_id": "CSAFPID-0298",
"product_identification_helper": {
"model_numbers": [
"6GK5408-2FD00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)",
"product_id": "CSAFPID-0299",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)",
"product_id": "CSAFPID-0300",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)",
"product_id": "CSAFPID-0301",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)",
"product_id": "CSAFPID-0302",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)",
"product_id": "CSAFPID-0303",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)",
"product_id": "CSAFPID-0304",
"product_identification_helper": {
"model_numbers": [
"6GK5205-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)",
"product_id": "CSAFPID-0305",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (SC) (6GK5206-2BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)",
"product_id": "CSAFPID-0306",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 (ST/BFOC) (6GK5206-2BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)",
"product_id": "CSAFPID-0307",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 LD (6GK5206-2BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)",
"product_id": "CSAFPID-0308",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 SC (6GK5206-2BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)",
"product_id": "CSAFPID-0309",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2 ST (6GK5206-2BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)",
"product_id": "CSAFPID-0310",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB206-2LD (6GK5206-2BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)",
"product_id": "CSAFPID-0311",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)",
"product_id": "CSAFPID-0312",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)",
"product_id": "CSAFPID-0313",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)",
"product_id": "CSAFPID-0314",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BD00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)",
"product_id": "CSAFPID-0315",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)",
"product_id": "CSAFPID-0316",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)",
"product_id": "CSAFPID-0317",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)",
"product_id": "CSAFPID-0318",
"product_identification_helper": {
"model_numbers": [
"6GK5213-3BF00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)",
"product_id": "CSAFPID-0319",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2TB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)",
"product_id": "CSAFPID-0320",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)",
"product_id": "CSAFPID-0321",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BD00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)",
"product_id": "CSAFPID-0322",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BB00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)",
"product_id": "CSAFPID-0323",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)",
"product_id": "CSAFPID-0324",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)",
"product_id": "CSAFPID-0325",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2RS00-5FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)",
"product_id": "CSAFPID-0326",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)",
"product_id": "CSAFPID-0327",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2BS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)",
"product_id": "CSAFPID-0328",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)",
"product_id": "CSAFPID-0329",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)",
"product_id": "CSAFPID-0330",
"product_identification_helper": {
"model_numbers": [
"6GK5206-2GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)",
"product_id": "CSAFPID-0331",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)",
"product_id": "CSAFPID-0332",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)",
"product_id": "CSAFPID-0333",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)",
"product_id": "CSAFPID-0334",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)",
"product_id": "CSAFPID-0335",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0GA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)",
"product_id": "CSAFPID-0336",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)",
"product_id": "CSAFPID-0337",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0RA00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)",
"product_id": "CSAFPID-0338",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)",
"product_id": "CSAFPID-0339",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)",
"product_id": "CSAFPID-0340",
"product_identification_helper": {
"model_numbers": [
"6GK5216-3RS00-5AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)",
"product_id": "CSAFPID-0341",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4BS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)",
"product_id": "CSAFPID-0342",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)",
"product_id": "CSAFPID-0343",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)",
"product_id": "CSAFPID-0344",
"product_identification_helper": {
"model_numbers": [
"6GK5216-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)",
"product_id": "CSAFPID-0345",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0BA00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)",
"product_id": "CSAFPID-0346",
"product_identification_helper": {
"model_numbers": [
"6GK5224-0BA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)",
"product_id": "CSAFPID-0347",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)",
"product_id": "CSAFPID-0348",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2TC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)",
"product_id": "CSAFPID-0349",
"product_identification_helper": {
"model_numbers": [
"6GK5224-4GS00-2FC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)",
"product_id": "CSAFPID-0350",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)",
"product_id": "CSAFPID-0351",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)",
"product_id": "CSAFPID-0352",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS00-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)",
"product_id": "CSAFPID-0353",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)",
"product_id": "CSAFPID-0354",
"product_identification_helper": {
"model_numbers": [
"6GK5424-8TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)",
"product_id": "CSAFPID-0355",
"product_identification_helper": {
"model_numbers": [
"6GK5428-4TR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)",
"product_id": "CSAFPID-0356",
"product_identification_helper": {
"model_numbers": [
"6GK5432-0GR00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)",
"product_id": "CSAFPID-0357",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2EC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)",
"product_id": "CSAFPID-0358",
"product_identification_helper": {
"model_numbers": [
"6GK5324-8TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)",
"product_id": "CSAFPID-0359",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4TS01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)",
"product_id": "CSAFPID-0360",
"product_identification_helper": {
"model_numbers": [
"6GK5332-0GA01-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)",
"product_id": "CSAFPID-0361",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)",
"product_id": "CSAFPID-0362",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0BA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)",
"product_id": "CSAFPID-0363",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2GF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)",
"product_id": "CSAFPID-0364",
"product_identification_helper": {
"model_numbers": [
"6GK5204-2AA00-2YF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)",
"product_id": "CSAFPID-0365",
"product_identification_helper": {
"model_numbers": [
"6GK5204-0GA00-1UF2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XF204G (6GK5204-0GA00-1UF2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)",
"product_id": "CSAFPID-0366",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GP00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)",
"product_id": "CSAFPID-0367",
"product_identification_helper": {
"model_numbers": [
"6GK5408-4GQ00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)",
"product_id": "CSAFPID-0368",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)",
"product_id": "CSAFPID-0369",
"product_identification_helper": {
"model_numbers": [
"6GK5408-8GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)",
"product_id": "CSAFPID-0370",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GS00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)",
"product_id": "CSAFPID-0371",
"product_identification_helper": {
"model_numbers": [
"6GK5416-4GR00-2AM2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)",
"product_id": "CSAFPID-0372",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)",
"product_id": "CSAFPID-0373",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (6GK5208-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)",
"product_id": "CSAFPID-0374",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)",
"product_id": "CSAFPID-0375",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)",
"product_id": "CSAFPID-0376",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208EEC (6GK5208-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)",
"product_id": "CSAFPID-0377",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G (6GK5208-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)",
"product_id": "CSAFPID-0378",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G EEC (6GK5208-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)",
"product_id": "CSAFPID-0379",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PoE EEC (6GK5208-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)",
"product_id": "CSAFPID-0380",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0JA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208G PP (6GK5208-0JA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)",
"product_id": "CSAFPID-0381",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)",
"product_id": "CSAFPID-0382",
"product_identification_helper": {
"model_numbers": [
"6GK5208-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP208PoE EEC (6GK5208-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)",
"product_id": "CSAFPID-0383",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)",
"product_id": "CSAFPID-0384",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2TS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)",
"product_id": "CSAFPID-0385",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216 (V2) (6GK5216-0HA10-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)",
"product_id": "CSAFPID-0386",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)",
"product_id": "CSAFPID-0387",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0HA10-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216EEC (V2) (6GK5216-0HA10-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)",
"product_id": "CSAFPID-0388",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2AS6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G (6GK5216-0XA00-2AS6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)",
"product_id": "CSAFPID-0389",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0XA00-2ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G EEC (6GK5216-0XA00-2ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)",
"product_id": "CSAFPID-0390",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0YA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216G PoE EEC (6GK5216-0YA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)",
"product_id": "CSAFPID-0391",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA00-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)",
"product_id": "CSAFPID-0392",
"product_identification_helper": {
"model_numbers": [
"6GK5216-0UA10-5ES6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XP216PoE EEC (V2) (6GK5216-0UA10-5ES6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)",
"product_id": "CSAFPID-0393",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)",
"product_id": "CSAFPID-0394",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)",
"product_id": "CSAFPID-0395",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)",
"product_id": "CSAFPID-0396",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)",
"product_id": "CSAFPID-0397",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)",
"product_id": "CSAFPID-0398",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)",
"product_id": "CSAFPID-0399",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)",
"product_id": "CSAFPID-0400",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)",
"product_id": "CSAFPID-0401",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)",
"product_id": "CSAFPID-0402",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)",
"product_id": "CSAFPID-0403",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)",
"product_id": "CSAFPID-0404",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)",
"product_id": "CSAFPID-0405",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)",
"product_id": "CSAFPID-0406",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)",
"product_id": "CSAFPID-0407",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)",
"product_id": "CSAFPID-0408",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)",
"product_id": "CSAFPID-0409",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)",
"product_id": "CSAFPID-0410",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)",
"product_id": "CSAFPID-0411",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)",
"product_id": "CSAFPID-0412",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)",
"product_id": "CSAFPID-0413",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)",
"product_id": "CSAFPID-0414",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)",
"product_id": "CSAFPID-0415",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)",
"product_id": "CSAFPID-0416",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)",
"product_id": "CSAFPID-0417",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)",
"product_id": "CSAFPID-0418",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)",
"product_id": "CSAFPID-0419",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)",
"product_id": "CSAFPID-0420",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)",
"product_id": "CSAFPID-0421",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)",
"product_id": "CSAFPID-0422",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)",
"product_id": "CSAFPID-0423",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)",
"product_id": "CSAFPID-0424",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)",
"product_id": "CSAFPID-0425",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)",
"product_id": "CSAFPID-0426",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)",
"product_id": "CSAFPID-0427",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)",
"product_id": "CSAFPID-0428",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)",
"product_id": "CSAFPID-0429",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)",
"product_id": "CSAFPID-0430",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)",
"product_id": "CSAFPID-0431",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)",
"product_id": "CSAFPID-0432",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)",
"product_id": "CSAFPID-0433",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)",
"product_id": "CSAFPID-0434",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)",
"product_id": "CSAFPID-0435",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)",
"product_id": "CSAFPID-0436",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0BA00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)",
"product_id": "CSAFPID-0437",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)",
"product_id": "CSAFPID-0438",
"product_identification_helper": {
"model_numbers": [
"6GK5326-2QS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)",
"product_id": "CSAFPID-0439",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)",
"product_id": "CSAFPID-0440",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)",
"product_id": "CSAFPID-0441",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)",
"product_id": "CSAFPID-0442",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS00-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)",
"product_id": "CSAFPID-0443",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)",
"product_id": "CSAFPID-0444",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)",
"product_id": "CSAFPID-0445",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)",
"product_id": "CSAFPID-0446",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4FS00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)",
"product_id": "CSAFPID-0447",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)",
"product_id": "CSAFPID-0448",
"product_identification_helper": {
"model_numbers": [
"6GK5328-4SS00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)",
"product_id": "CSAFPID-0449",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)",
"product_id": "CSAFPID-0450",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)",
"product_id": "CSAFPID-0451",
"product_identification_helper": {
"model_numbers": [
"6GK5534-5TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)",
"product_id": "CSAFPID-0452",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)",
"product_id": "CSAFPID-0453",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)",
"product_id": "CSAFPID-0454",
"product_identification_helper": {
"model_numbers": [
"6GK5534-3TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)",
"product_id": "CSAFPID-0455",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)",
"product_id": "CSAFPID-0456",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)",
"product_id": "CSAFPID-0457",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)",
"product_id": "CSAFPID-0458",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)",
"product_id": "CSAFPID-0459",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)",
"product_id": "CSAFPID-0460",
"product_identification_helper": {
"model_numbers": [
"6GK5524-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)",
"product_id": "CSAFPID-0461",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)",
"product_id": "CSAFPID-0462",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-2RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-2RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)",
"product_id": "CSAFPID-0463",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)",
"product_id": "CSAFPID-0464",
"product_identification_helper": {
"model_numbers": [
"6GK5532-2SR00-3RR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR524-8WG (6GK5532-2SR00-3RR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)",
"product_id": "CSAFPID-0465",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)",
"product_id": "CSAFPID-0466",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV1.3",
"product": {
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)",
"product_id": "CSAFPID-0467",
"product_identification_helper": {
"model_numbers": [
"6GK5534-2TR00-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)",
"product_id": "CSAFPID-0468",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)",
"product_id": "CSAFPID-0469",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)",
"product_id": "CSAFPID-0470",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)",
"product_id": "CSAFPID-0471",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-4AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)",
"product_id": "CSAFPID-0472",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GS00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)",
"product_id": "CSAFPID-0473",
"product_identification_helper": {
"model_numbers": [
"6GK5526-8GR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)",
"product_id": "CSAFPID-0474",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)",
"product_id": "CSAFPID-0475",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)",
"product_id": "CSAFPID-0476",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)",
"product_id": "CSAFPID-0477",
"product_identification_helper": {
"model_numbers": [
"6GK5528-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)",
"product_id": "CSAFPID-0478",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)",
"product_id": "CSAFPID-0479",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)",
"product_id": "CSAFPID-0480",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AR00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)",
"product_id": "CSAFPID-0481",
"product_identification_helper": {
"model_numbers": [
"6GK5552-0AA00-2AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)",
"product_id": "CSAFPID-0482",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2ER3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)",
"product_id": "CSAFPID-0483",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)",
"product_id": "CSAFPID-0484",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)",
"product_id": "CSAFPID-0485",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-4AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)",
"product_id": "CSAFPID-0486",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)",
"product_id": "CSAFPID-0487",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)",
"product_id": "CSAFPID-0488",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-2AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)",
"product_id": "CSAFPID-0489",
"product_identification_helper": {
"model_numbers": [
"6GK5334-2TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)",
"product_id": "CSAFPID-0490",
"product_identification_helper": {
"model_numbers": [
"6GK5334-3TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV3.2",
"product": {
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)",
"product_id": "CSAFPID-0491",
"product_identification_helper": {
"model_numbers": [
"6GK5334-5TS01-3AR3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.0_SP2_Update_4_only_when_the_Relay_feature_is_enabled",
"product": {
"name": "SINEC INS",
"product_id": "CSAFPID-0492"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.1.9",
"product": {
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)",
"product_id": "CSAFPID-0493",
"product_identification_helper": {
"model_numbers": [
"6AG1308-2FL10-4AA3"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)",
"product_id": "CSAFPID-0494",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BB00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)",
"product_id": "CSAFPID-0495",
"product_identification_helper": {
"model_numbers": [
"6AG1206-2BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)",
"product_id": "CSAFPID-0496",
"product_identification_helper": {
"model_numbers": [
"6AG1208-0BA00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV4.6",
"product": {
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)",
"product_id": "CSAFPID-0497",
"product_identification_helper": {
"model_numbers": [
"6AG1216-4BS00-7AC2"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
},
{
"category": "mitigation",
"details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP2 Update 4 or later version",
"product_ids": [
"CSAFPID-0492"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.3 or later version",
"product_ids": [
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977441/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977720/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"CSAFPID-0151",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V3.2 or later version",
"product_ids": [
"CSAFPID-0360"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109988839/"
},
{
"category": "vendor_fix",
"details": "Update to V4.1.9 or later version",
"product_ids": [
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0493"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109982245/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0010",
"CSAFPID-0012",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0020",
"CSAFPID-0022",
"CSAFPID-0035",
"CSAFPID-0037",
"CSAFPID-0039",
"CSAFPID-0041",
"CSAFPID-0049",
"CSAFPID-0051",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0062",
"CSAFPID-0064",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0091",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0097",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0102",
"CSAFPID-0105",
"CSAFPID-0111",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0119",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0127",
"CSAFPID-0129",
"CSAFPID-0133",
"CSAFPID-0137",
"CSAFPID-0141"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3.11 or later version",
"product_ids": [
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0009",
"CSAFPID-0011",
"CSAFPID-0013",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0036",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0084",
"CSAFPID-0087",
"CSAFPID-0090",
"CSAFPID-0092",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0098",
"CSAFPID-0101",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0106",
"CSAFPID-0113",
"CSAFPID-0118",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0128",
"CSAFPID-0131",
"CSAFPID-0135",
"CSAFPID-0139",
"CSAFPID-0143"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977251/"
},
{
"category": "vendor_fix",
"details": "Update to V4.6 or later version",
"product_ids": [
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977185/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0021",
"CSAFPID-0050",
"CSAFPID-0052",
"CSAFPID-0055",
"CSAFPID-0058",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0112",
"CSAFPID-0117",
"CSAFPID-0123",
"CSAFPID-0130",
"CSAFPID-0134",
"CSAFPID-0138",
"CSAFPID-0142",
"CSAFPID-0145",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0023",
"CSAFPID-0044",
"CSAFPID-0048",
"CSAFPID-0061",
"CSAFPID-0076",
"CSAFPID-0114",
"CSAFPID-0120",
"CSAFPID-0126",
"CSAFPID-0132",
"CSAFPID-0136",
"CSAFPID-0140",
"CSAFPID-0144",
"CSAFPID-0146"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.6 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976555/"
},
{
"category": "vendor_fix",
"details": "Update to V8.2 or later version",
"product_ids": [
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109976047/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090",
"CSAFPID-0091",
"CSAFPID-0092",
"CSAFPID-0093",
"CSAFPID-0094",
"CSAFPID-0095",
"CSAFPID-0096",
"CSAFPID-0097",
"CSAFPID-0098",
"CSAFPID-0099",
"CSAFPID-0100",
"CSAFPID-0101",
"CSAFPID-0102",
"CSAFPID-0103",
"CSAFPID-0104",
"CSAFPID-0105",
"CSAFPID-0106",
"CSAFPID-0107",
"CSAFPID-0108",
"CSAFPID-0109",
"CSAFPID-0110",
"CSAFPID-0111",
"CSAFPID-0112",
"CSAFPID-0113",
"CSAFPID-0114",
"CSAFPID-0115",
"CSAFPID-0116",
"CSAFPID-0117",
"CSAFPID-0118",
"CSAFPID-0119",
"CSAFPID-0120",
"CSAFPID-0121",
"CSAFPID-0122",
"CSAFPID-0123",
"CSAFPID-0124",
"CSAFPID-0125",
"CSAFPID-0126",
"CSAFPID-0127",
"CSAFPID-0128",
"CSAFPID-0129",
"CSAFPID-0130",
"CSAFPID-0131",
"CSAFPID-0132",
"CSAFPID-0133",
"CSAFPID-0134",
"CSAFPID-0135",
"CSAFPID-0136",
"CSAFPID-0137",
"CSAFPID-0138",
"CSAFPID-0139",
"CSAFPID-0140",
"CSAFPID-0141",
"CSAFPID-0142",
"CSAFPID-0143",
"CSAFPID-0144",
"CSAFPID-0145",
"CSAFPID-0146",
"CSAFPID-0147",
"CSAFPID-0148",
"CSAFPID-0149",
"CSAFPID-0150",
"CSAFPID-0151",
"CSAFPID-0152",
"CSAFPID-0153",
"CSAFPID-0154",
"CSAFPID-0155",
"CSAFPID-0156",
"CSAFPID-0157",
"CSAFPID-0158",
"CSAFPID-0159",
"CSAFPID-0160",
"CSAFPID-0161",
"CSAFPID-0162",
"CSAFPID-0163",
"CSAFPID-0164",
"CSAFPID-0165",
"CSAFPID-0166",
"CSAFPID-0167",
"CSAFPID-0168",
"CSAFPID-0169",
"CSAFPID-0170",
"CSAFPID-0171",
"CSAFPID-0172",
"CSAFPID-0173",
"CSAFPID-0174",
"CSAFPID-0175",
"CSAFPID-0176",
"CSAFPID-0177",
"CSAFPID-0178",
"CSAFPID-0179",
"CSAFPID-0180",
"CSAFPID-0181",
"CSAFPID-0182",
"CSAFPID-0183",
"CSAFPID-0184",
"CSAFPID-0185",
"CSAFPID-0186",
"CSAFPID-0187",
"CSAFPID-0188",
"CSAFPID-0189",
"CSAFPID-0190",
"CSAFPID-0191",
"CSAFPID-0192",
"CSAFPID-0193",
"CSAFPID-0194",
"CSAFPID-0195",
"CSAFPID-0196",
"CSAFPID-0197",
"CSAFPID-0198",
"CSAFPID-0199",
"CSAFPID-0200",
"CSAFPID-0201",
"CSAFPID-0202",
"CSAFPID-0203",
"CSAFPID-0204",
"CSAFPID-0205",
"CSAFPID-0206",
"CSAFPID-0207",
"CSAFPID-0208",
"CSAFPID-0209",
"CSAFPID-0210",
"CSAFPID-0211",
"CSAFPID-0212",
"CSAFPID-0213",
"CSAFPID-0214",
"CSAFPID-0215",
"CSAFPID-0216",
"CSAFPID-0217",
"CSAFPID-0218",
"CSAFPID-0219",
"CSAFPID-0220",
"CSAFPID-0221",
"CSAFPID-0222",
"CSAFPID-0223",
"CSAFPID-0224",
"CSAFPID-0225",
"CSAFPID-0226",
"CSAFPID-0227",
"CSAFPID-0228",
"CSAFPID-0229",
"CSAFPID-0230",
"CSAFPID-0231",
"CSAFPID-0232",
"CSAFPID-0233",
"CSAFPID-0234",
"CSAFPID-0235",
"CSAFPID-0236",
"CSAFPID-0237",
"CSAFPID-0238",
"CSAFPID-0239",
"CSAFPID-0240",
"CSAFPID-0241",
"CSAFPID-0242",
"CSAFPID-0243",
"CSAFPID-0244",
"CSAFPID-0245",
"CSAFPID-0246",
"CSAFPID-0247",
"CSAFPID-0248",
"CSAFPID-0249",
"CSAFPID-0250",
"CSAFPID-0251",
"CSAFPID-0252",
"CSAFPID-0253",
"CSAFPID-0254",
"CSAFPID-0255",
"CSAFPID-0256",
"CSAFPID-0257",
"CSAFPID-0258",
"CSAFPID-0259",
"CSAFPID-0260",
"CSAFPID-0261",
"CSAFPID-0262",
"CSAFPID-0263",
"CSAFPID-0264",
"CSAFPID-0265",
"CSAFPID-0266",
"CSAFPID-0267",
"CSAFPID-0268",
"CSAFPID-0269",
"CSAFPID-0270",
"CSAFPID-0271",
"CSAFPID-0272",
"CSAFPID-0273",
"CSAFPID-0274",
"CSAFPID-0275",
"CSAFPID-0276",
"CSAFPID-0277",
"CSAFPID-0278",
"CSAFPID-0279",
"CSAFPID-0280",
"CSAFPID-0281",
"CSAFPID-0282",
"CSAFPID-0283",
"CSAFPID-0284",
"CSAFPID-0285",
"CSAFPID-0286",
"CSAFPID-0287",
"CSAFPID-0288",
"CSAFPID-0289",
"CSAFPID-0290",
"CSAFPID-0291",
"CSAFPID-0292",
"CSAFPID-0293",
"CSAFPID-0294",
"CSAFPID-0295",
"CSAFPID-0296",
"CSAFPID-0297",
"CSAFPID-0298",
"CSAFPID-0299",
"CSAFPID-0300",
"CSAFPID-0301",
"CSAFPID-0302",
"CSAFPID-0303",
"CSAFPID-0304",
"CSAFPID-0305",
"CSAFPID-0306",
"CSAFPID-0307",
"CSAFPID-0308",
"CSAFPID-0309",
"CSAFPID-0310",
"CSAFPID-0311",
"CSAFPID-0312",
"CSAFPID-0313",
"CSAFPID-0314",
"CSAFPID-0315",
"CSAFPID-0316",
"CSAFPID-0317",
"CSAFPID-0318",
"CSAFPID-0319",
"CSAFPID-0320",
"CSAFPID-0321",
"CSAFPID-0322",
"CSAFPID-0323",
"CSAFPID-0324",
"CSAFPID-0325",
"CSAFPID-0326",
"CSAFPID-0327",
"CSAFPID-0328",
"CSAFPID-0329",
"CSAFPID-0330",
"CSAFPID-0331",
"CSAFPID-0332",
"CSAFPID-0333",
"CSAFPID-0334",
"CSAFPID-0335",
"CSAFPID-0336",
"CSAFPID-0337",
"CSAFPID-0338",
"CSAFPID-0339",
"CSAFPID-0340",
"CSAFPID-0341",
"CSAFPID-0342",
"CSAFPID-0343",
"CSAFPID-0344",
"CSAFPID-0345",
"CSAFPID-0346",
"CSAFPID-0347",
"CSAFPID-0348",
"CSAFPID-0349",
"CSAFPID-0350",
"CSAFPID-0351",
"CSAFPID-0352",
"CSAFPID-0353",
"CSAFPID-0354",
"CSAFPID-0355",
"CSAFPID-0356",
"CSAFPID-0357",
"CSAFPID-0358",
"CSAFPID-0359",
"CSAFPID-0360",
"CSAFPID-0361",
"CSAFPID-0362",
"CSAFPID-0363",
"CSAFPID-0364",
"CSAFPID-0365",
"CSAFPID-0366",
"CSAFPID-0367",
"CSAFPID-0368",
"CSAFPID-0369",
"CSAFPID-0370",
"CSAFPID-0371",
"CSAFPID-0372",
"CSAFPID-0373",
"CSAFPID-0374",
"CSAFPID-0375",
"CSAFPID-0376",
"CSAFPID-0377",
"CSAFPID-0378",
"CSAFPID-0379",
"CSAFPID-0380",
"CSAFPID-0381",
"CSAFPID-0382",
"CSAFPID-0383",
"CSAFPID-0384",
"CSAFPID-0385",
"CSAFPID-0386",
"CSAFPID-0387",
"CSAFPID-0388",
"CSAFPID-0389",
"CSAFPID-0390",
"CSAFPID-0391",
"CSAFPID-0392",
"CSAFPID-0393",
"CSAFPID-0394",
"CSAFPID-0395",
"CSAFPID-0396",
"CSAFPID-0397",
"CSAFPID-0398",
"CSAFPID-0399",
"CSAFPID-0400",
"CSAFPID-0401",
"CSAFPID-0402",
"CSAFPID-0403",
"CSAFPID-0404",
"CSAFPID-0405",
"CSAFPID-0406",
"CSAFPID-0407",
"CSAFPID-0408",
"CSAFPID-0409",
"CSAFPID-0410",
"CSAFPID-0411",
"CSAFPID-0412",
"CSAFPID-0413",
"CSAFPID-0414",
"CSAFPID-0415",
"CSAFPID-0416",
"CSAFPID-0417",
"CSAFPID-0418",
"CSAFPID-0419",
"CSAFPID-0420",
"CSAFPID-0421",
"CSAFPID-0422",
"CSAFPID-0423",
"CSAFPID-0424",
"CSAFPID-0425",
"CSAFPID-0426",
"CSAFPID-0427",
"CSAFPID-0428",
"CSAFPID-0429",
"CSAFPID-0430",
"CSAFPID-0431",
"CSAFPID-0432",
"CSAFPID-0433",
"CSAFPID-0434",
"CSAFPID-0435",
"CSAFPID-0436",
"CSAFPID-0437",
"CSAFPID-0438",
"CSAFPID-0439",
"CSAFPID-0440",
"CSAFPID-0441",
"CSAFPID-0442",
"CSAFPID-0443",
"CSAFPID-0444",
"CSAFPID-0445",
"CSAFPID-0446",
"CSAFPID-0447",
"CSAFPID-0448",
"CSAFPID-0449",
"CSAFPID-0450",
"CSAFPID-0451",
"CSAFPID-0452",
"CSAFPID-0453",
"CSAFPID-0454",
"CSAFPID-0455",
"CSAFPID-0456",
"CSAFPID-0457",
"CSAFPID-0458",
"CSAFPID-0459",
"CSAFPID-0460",
"CSAFPID-0461",
"CSAFPID-0462",
"CSAFPID-0463",
"CSAFPID-0464",
"CSAFPID-0465",
"CSAFPID-0466",
"CSAFPID-0467",
"CSAFPID-0468",
"CSAFPID-0469",
"CSAFPID-0470",
"CSAFPID-0471",
"CSAFPID-0472",
"CSAFPID-0473",
"CSAFPID-0474",
"CSAFPID-0475",
"CSAFPID-0476",
"CSAFPID-0477",
"CSAFPID-0478",
"CSAFPID-0479",
"CSAFPID-0480",
"CSAFPID-0481",
"CSAFPID-0482",
"CSAFPID-0483",
"CSAFPID-0484",
"CSAFPID-0485",
"CSAFPID-0486",
"CSAFPID-0487",
"CSAFPID-0488",
"CSAFPID-0489",
"CSAFPID-0490",
"CSAFPID-0491",
"CSAFPID-0492",
"CSAFPID-0493",
"CSAFPID-0494",
"CSAFPID-0495",
"CSAFPID-0496",
"CSAFPID-0497"
]
}
],
"title": "CVE-2024-3596"
}
]
}
icsa-25-044-06
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Fortinet has published information on vulnerabilities in FortiOS. This advisory lists the related Siemens Industrial products.\n\nSiemens has released a new version for RUGGEDCOM APE1808 and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-770770 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770770.json"
},
{
"category": "self",
"summary": "SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-770770.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-044-06 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-044-06.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-044-06 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-06"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
}
],
"title": "Siemens RUGGEDCOM APE1808 Devices",
"tracking": {
"current_release_date": "2025-11-11T00:00:00.000000Z",
"generator": {
"date": "2025-11-17T18:18:49.897881Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-044-06",
"initial_release_date": "2025-02-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-02-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-03-11T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added newly published upstream vulnerabilities CVE-2024-35279 and CVE-2024-40591"
},
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added newly published upstream vulnerabilities CVE-2024-48886, CVE-2024-50563, CVE-2024-45324 and CVE-2024-3596"
},
{
"date": "2025-05-13T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added newly published upstream vulnerabilities CVE-2024-21762, CVE-2022-42475, CVE-2023-27997, CVE-2024-26013 and CVE-2024-50565. Moved CVE-2024-52963 to SSA-864900"
},
{
"date": "2025-06-10T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added newly published upstream vulnerability CVE-2025-22252"
},
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added newly published upstream vulnerabilities CVE-2025-22254 and CVE-2025-22251"
},
{
"date": "2025-08-12T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added newly published upstream vulnerability CVE-2024-52965"
},
{
"date": "2025-11-11T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added newly published upstream vulnerabilities CVE-2024-50571, CVE-2025-22258, CVE-2024-47569, CVE-2025-25252 and CVE-2025-58325"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0001"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0002"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0003"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM APE1808",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-42475",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow vulnerability [CWE-122]\u00a0in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2022-42475"
},
{
"cve": "CVE-2023-27997",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2023-27997"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "summary",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Use RADIUS over TLS (aka RADSEC) (https://fortiguard.fortinet.com/psirt/FG-IR-24-255)",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-21762",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-21762"
},
{
"cve": "CVE-2024-26013",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2 before 6.4.8 and Fortinet FortiWeb before 7.4.2 may allow an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-26013"
},
{
"cve": "CVE-2024-35279",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A stack-based buffer overflow vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "For each interface, remove the fabric service or block CAPWAP-CONTROL access to port 5246 through a local-in policy (see https://fortiguard.fortinet.com/psirt/FG-IR-24-160)",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-35279"
},
{
"cve": "CVE-2024-36504",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability [CWE-125] in FortiOS SSLVPN web portal versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, 7.0 all verisons, and 6.4 all versions may allow an authenticated attacker to perform a denial of service on the SSLVPN web portal via a specially crafted URL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-36504"
},
{
"cve": "CVE-2024-40591",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "summary",
"text": "An incorrect privilege assignment vulnerability in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-40591"
},
{
"cve": "CVE-2024-45324",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"notes": [
{
"category": "summary",
"text": "A use of externally-controlled format string vulnerability in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-45324"
},
{
"cve": "CVE-2024-46665",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "summary",
"text": "An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46665"
},
{
"cve": "CVE-2024-46666",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "An allocation of resources without limits or throttling [CWE-770] vulnerability in FortiOS versions 7.6.0, versions 7.4.4 through 7.4.0, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow a remote unauthenticated attacker to prevent access to the GUI via specially crafted requests directed at specific endpoints.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46666"
},
{
"cve": "CVE-2024-46668",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiOS versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, versions 7.0.0 through 7.0.15, and versions 6.4.0 through 6.4.15 may allow an unauthenticated remote user to consume all system memory via multiple large file uploads.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46668"
},
{
"cve": "CVE-2024-46669",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An\u00a0Integer Overflow or Wraparound vulnerability in version 7.4.4 and below, version 7.2.10 and below; FortiSASE version 23.4.b FortiOS tenant IPsec IKE service may allow an authenticated attacker to crash the IPsec tunnel via crafted requests, resulting in potential denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46669"
},
{
"cve": "CVE-2024-46670",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An\u00a0Out-of-bounds Read vulnerability in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-46670"
},
{
"cve": "CVE-2024-47569",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "summary",
"text": "A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-47569"
},
{
"cve": "CVE-2024-48884",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A improper limitation of a pathname to a restricted directory (\u0027path traversal\u0027) in Fortinet FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiOS versions 7.6.0, 7.4.0 through 7.4.4, 7.2.5 through 7.2.9, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy 7.4.0 through 7.4.5, 7.2.0 through 7.2.11, 7.0.0 through 7.0.18, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to trigger an escalation of privilege via specially crafted packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-48884"
},
{
"cve": "CVE-2024-48885",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A improper limitation of a pathname to a restricted directory (\u0027path traversal\u0027) in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-48885"
},
{
"cve": "CVE-2024-48886",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "summary",
"text": "A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-48886"
},
{
"cve": "CVE-2024-50563",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "summary",
"text": "A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50563"
},
{
"cve": "CVE-2024-50565",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "summary",
"text": "A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-50565"
},
{
"cve": "CVE-2024-50571",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow in Fortinet FortiOS 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, FortiManager Cloud 7.6.2, 7.4.1 through 7.4.5, 7.2.1 through 7.2.8, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7, FortiAnalyzer Cloud 7.4.1 through 7.4.5, 7.2.1 through 7.2.8, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7, FortiProxy 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.12, 7.0.0 through 7.0.19, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiAnalyzer 7.6.0 through 7.6.2, 7.4.0 through 7.4.5, 7.2.0 through 7.2.8, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, 6.2.0 through 6.2.13, 6.0.0 through 6.0.12, FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.9, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, 6.2.0 through 6.2.13, 6.0.0 through 6.0.12 allows attacker to execute unauthorized code or commands via specifically crafted requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-50571"
},
{
"cve": "CVE-2024-52965",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "summary",
"text": "A missing critical step in authentication vulnerability [CWE-304] in Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and before 7.0.16 \u0026 FortiProxy version 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13 and before 7.0.20 allows an API-user using api-key + PKI user certificate authentication to login even if the certificate is invalid.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52965"
},
{
"cve": "CVE-2024-54021",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An improper neutralization of crlf sequences in http headers (\u0027http response splitting\u0027) in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-54021"
},
{
"cve": "CVE-2025-22251",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0004"
]
}
],
"title": "CVE-2025-22251"
},
{
"cve": "CVE-2025-22252",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "A missing authentication for critical function vulnerability in FortiOS, FortiProxy, and FortiSwitchManager TACACS+ configured to use a remote TACACS+ server for authentication, that has itself been configured to use ASCII authentication may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Use alternate authentication mechanism such as PAP, MSCHAP, and CHAP configurations other than ASCII authentication (see https://www.fortiguard.com/psirt/FG-IR-24-472)",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0003"
]
}
],
"title": "CVE-2025-22252"
},
{
"cve": "CVE-2025-22254",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "An Improper Privilege Management vulnerability [CWE-269] affecting Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16 and before 6.4.15, FortiProxy version 7.6.0 through 7.6.1 and before 7.4.7 \u0026 FortiWeb version 7.6.0 through 7.6.1 and before 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to\u00a0Node.js websocket module.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:W/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0004"
]
}
],
"title": "CVE-2025-22254"
},
{
"cve": "CVE-2025-22258",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A heap-based buffer overflow in Fortinet FortiSRA 1.5.0, 1.4.0 through 1.4.2, FortiPAM 1.5.0, 1.4.0 through 1.4.2, 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy 7.6.0 through 7.6.1, 7.4.0 through 7.4.7, FortiOS 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.2 through 7.0.16, FortiSwitchManager 7.2.1 through 7.2.5 allows attackers to escalate their privilege via specially crafted http requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2025-22258"
},
{
"cve": "CVE-2025-25252",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "summary",
"text": "An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2025-25252"
},
{
"cve": "CVE-2025-58325",
"cwe": {
"id": "CWE-684",
"name": "Incorrect Provision of Specified Functionality"
},
"notes": [
{
"category": "summary",
"text": "An Incorrect Provision of Specified Functionality vulnerability [CWE-684] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2.5 through 7.2.10, 7.0.0 through 7.0.15, 6.4 all versions may allow a local authenticated attacker to execute system commands via crafted CLI commands.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002"
]
}
],
"title": "CVE-2025-58325"
}
]
}
cisco-sa-radius-spoofing-july-2024-87ccdwz3
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:\r\n\r\nCVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\r\nThis vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks [\"https://www.kb.cert.org/vuls/id/456537\"].\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco investigated its product line to determine which products and cloud services may be affected by this vulnerability.\r\n\r\nThe Vulnerable Products section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Cable Devices Cisco Optical Site Manager CSCwq90178 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq90178\"] Endpoint Clients and Client Software Duo Authentication Proxy CSCwk87884 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884\"] Network and Content Security Devices Adaptive Security Appliance (ASA) CSCwk71992 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992\"] Firepower Device Manager (FDM) CSCwk69454 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454\"] Firepower Management Center (FMC) Software CSCwk71817 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817\"] Firepower Threat Defense (FTD) Software CSCwk67902 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902\"] Meraki MX Series Notes [\"https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024\"] Identity Services Engine (ISE) CSCwk67747 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747\"] Secure Email Gateway CSCwk70832 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832\"] Secure Email and Web Manager CSCwk70833 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833\"] Secure Firewall CSCwk67859 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859\"] Secure Network Analytics CSCwk73619 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619\"] Secure Web Appliance CSCwk70834 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834\"] Network Management and Provisioning Application Policy Infrastructure Controller (APIC) CSCwk70836 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836\"] Crosswork Network Controller CSCwk70850 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850\"] Nexus Dashboard, formerly Application Services Engine CSCwk70840 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840\"] Prime Infrastructure CSCwk79727 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727\"] Routing and Switching - Enterprise and Service Provider ASR 5000 Series Routers CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Catalyst Center CSCwk70845 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845\"] Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] GGSN Gateway GPRS Support Node CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] IOS Software CSCwk78278 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278\"] IOS XE Software CSCwk70852 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852\"] IOS XR Software CSCwk70236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236\"] IOx Fog Director CSCwk70851 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851\"] MDS 9000 Series Multilayer Switches CSCwk70837 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837\"] Network Convergence System (NCS) 2000 Series CSCwm33240 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240\"] Nexus 1000V Series Switches CSCwk79691 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691\"] Nexus 3000 Series Switches CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] Nexus 5500 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 5600 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 6000 Series Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 7000 Series Switches CSCwk70838 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838\"] Nexus 9000 Series Fabric Switches in ACI Mode CSCwk83051 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051\"] Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] PGW Packet Data Network Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] SD-WAN vEdge Routers CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] System Architecture Evolution (SAE) Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Ultra Packet Core CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Unified Computing Enterprise NFV Infrastructure Software (NFVIS) CSCwk79647 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647\"] UCS Central Software CSCwk71967 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967\"] UCS Manager CSCwk70842 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842\"] Wireless AireOS Wireless LAN Controllers CSCwk70846 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846\"] Catalyst 9800 Series Wireless Controllers CSCwk70852 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852\"]",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nNetwork Application, Service, and Acceleration\r\n\r\nNexus Dashboard Insights (On Prem)\r\nSecure Workload\r\n\r\nNetwork and Content Security Devices\r\n\r\nFirepower 4100/9300 FXOS Firepower Chassis Manager\r\nSecure Malware Analytics Appliance\r\nUmbrella Active Directory (AD) Connector\r\n\r\nNetwork Management and Provisioning\r\n\r\nCisco Evolved Programmable Network Manager (EPNM)\r\nDNA Spaces Connector\r\nPolicy Suite\r\nThousandEyes Enterprise Agent\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nUltra Cloud Core - Policy Control Function\r\n\r\nUnified Computing\r\n\r\nUCS B-Series Blade Servers\r\n\r\nWireless\r\n\r\n6300 Series Embedded Services Access Points\r\nAironet 1540 Series\r\nAironet 1560 Series\r\nAironet 1810 Series OfficeExtend Access Points\r\nAironet 1810w Series Access Points\r\nAironet 1815 Series Access Points\r\nAironet 1830 Series Access Points\r\nAironet 1850 Series Access Points\r\nAironet 2800 Series Access Points\r\nAironet 3800 Series Access Points\r\nAironet 4800 Access Points\r\nAironet 802.11ac Wave2 Access Points\r\nCatalyst 9100 Series Access Points\r\nCatalyst IW6300 Heavy Duty Series Access Points\r\nCatalyst IW9165 Heavy Duty Series\r\nCatalyst IW9165 Rugged Series\r\nCatalyst IW9167 Heavy Duty Series",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.\r\n\r\nRADIUS clients and servers configured to use DTLS or TLS over TCP are not exploitable, even if the underlying implementation is otherwise vulnerable, as long as the traffic is not sent in plaintext.\r\n\r\nCustomers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "VU#456537: RADIUS protocol susceptible to forgery attacks",
"url": "https://www.kb.cert.org/vuls/id/456537"
},
{
"category": "external",
"summary": "CSCwq90178",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq90178"
},
{
"category": "external",
"summary": "CSCwk87884",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884"
},
{
"category": "external",
"summary": "CSCwk71992",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992"
},
{
"category": "external",
"summary": "CSCwk69454",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454"
},
{
"category": "external",
"summary": "CSCwk71817",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817"
},
{
"category": "external",
"summary": "CSCwk67902",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902"
},
{
"category": "external",
"summary": "Notes",
"url": "https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024"
},
{
"category": "external",
"summary": "CSCwk67747",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747"
},
{
"category": "external",
"summary": "CSCwk70832",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832"
},
{
"category": "external",
"summary": "CSCwk70833",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833"
},
{
"category": "external",
"summary": "CSCwk67859",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859"
},
{
"category": "external",
"summary": "CSCwk73619",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619"
},
{
"category": "external",
"summary": "CSCwk70834",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834"
},
{
"category": "external",
"summary": "CSCwk70836",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836"
},
{
"category": "external",
"summary": "CSCwk70850",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850"
},
{
"category": "external",
"summary": "CSCwk70840",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840"
},
{
"category": "external",
"summary": "CSCwk79727",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727"
},
{
"category": "external",
"summary": "CSCwk70831",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"
},
{
"category": "external",
"summary": "CSCwk70845",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845"
},
{
"category": "external",
"summary": "CSCwk70854",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"
},
{
"category": "external",
"summary": "CSCwk78278",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278"
},
{
"category": "external",
"summary": "CSCwk70852",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852"
},
{
"category": "external",
"summary": "CSCwk70236",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236"
},
{
"category": "external",
"summary": "CSCwk70851",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851"
},
{
"category": "external",
"summary": "CSCwk70837",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837"
},
{
"category": "external",
"summary": "CSCwm33240",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240"
},
{
"category": "external",
"summary": "CSCwk79691",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691"
},
{
"category": "external",
"summary": "CSCwk70839",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839"
},
{
"category": "external",
"summary": "CSCwk79692",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"
},
{
"category": "external",
"summary": "CSCwk70838",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838"
},
{
"category": "external",
"summary": "CSCwk83051",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051"
},
{
"category": "external",
"summary": "CSCwk79647",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647"
},
{
"category": "external",
"summary": "CSCwk71967",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967"
},
{
"category": "external",
"summary": "CSCwk70842",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842"
},
{
"category": "external",
"summary": "CSCwk70846",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846"
},
{
"category": "external",
"summary": "fixed software releases",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"
}
],
"title": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024",
"tracking": {
"current_release_date": "2024-09-03T14:10:25+00:00",
"generator": {
"date": "2025-09-11T19:12:33+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-radius-spoofing-july-2024-87cCDwZ3",
"initial_release_date": "2024-07-10T16:00:00+00:00",
"revision_history": [
{
"date": "2024-07-10T21:54:27+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2024-07-11T21:24:06+00:00",
"number": "1.1.0",
"summary": "Updated the list of products currently under investigation."
},
{
"date": "2024-07-16T21:57:30+00:00",
"number": "1.2.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-17T21:37:05+00:00",
"number": "1.3.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-19T20:54:21+00:00",
"number": "1.4.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-24T19:33:11+00:00",
"number": "1.5.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-29T20:06:24+00:00",
"number": "1.6.0",
"summary": "Updated lists of products currently under investigation and products determined to be affected."
},
{
"date": "2024-08-02T18:48:25+00:00",
"number": "1.7.0",
"summary": "Updated summary, lists of products currently under investigation, and products determined to be affected."
},
{
"date": "2024-08-09T19:53:46+00:00",
"number": "1.8.0",
"summary": "Updated lists of products considered vulnerable and products considered not vulnerable."
},
{
"date": "2024-08-19T17:00:13+00:00",
"number": "1.9.0",
"summary": "Updated the list of products confirmed not vulnerable."
},
{
"date": "2024-09-03T14:10:25+00:00",
"number": "1.10.0",
"summary": "Added Network Convergence System 2000 Series to the list of vulnerable products."
}
],
"status": "final",
"version": "1.10.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Cisco Adaptive Security Appliance (ASA) Software",
"product": {
"name": "Cisco Adaptive Security Appliance (ASA) Software ",
"product_id": "CSAFPID-6588"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-6588"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-6588"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-6588"
]
}
],
"title": "RADIUS Vulnerability Affecting Cisco Products: July 2024"
}
]
}
cisco-sa-radius-spoofing-july-2024-87cCDwZ3
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:\r\n\r\nCVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\r\nThis vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks [\"https://www.kb.cert.org/vuls/id/456537\"].\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco investigated its product line to determine which products and cloud services may be affected by this vulnerability.\r\n\r\nThe Vulnerable Products section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Cable Devices Cisco Optical Site Manager CSCwq90178 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq90178\"] Endpoint Clients and Client Software Duo Authentication Proxy CSCwk87884 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884\"] Network and Content Security Devices Adaptive Security Appliance (ASA) CSCwk71992 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992\"] Firepower Device Manager (FDM) CSCwk69454 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454\"] Firepower Management Center (FMC) Software CSCwk71817 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817\"] Firepower Threat Defense (FTD) Software CSCwk67902 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902\"] Meraki MX Series Notes [\"https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024\"] Identity Services Engine (ISE) CSCwk67747 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747\"] Secure Email Gateway CSCwk70832 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832\"] Secure Email and Web Manager CSCwk70833 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833\"] Secure Firewall CSCwk67859 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859\"] Secure Network Analytics CSCwk73619 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619\"] Secure Web Appliance CSCwk70834 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834\"] Network Management and Provisioning Application Policy Infrastructure Controller (APIC) CSCwk70836 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836\"] Crosswork Network Controller CSCwk70850 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850\"] Nexus Dashboard, formerly Application Services Engine CSCwk70840 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840\"] Prime Infrastructure CSCwk79727 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727\"] Routing and Switching - Enterprise and Service Provider ASR 5000 Series Routers CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Catalyst Center CSCwk70845 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845\"] Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] GGSN Gateway GPRS Support Node CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] IOS Software CSCwk78278 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278\"] IOS XE Software CSCwk70852 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852\"] IOS XR Software CSCwk70236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236\"] IOx Fog Director CSCwk70851 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851\"] MDS 9000 Series Multilayer Switches CSCwk70837 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837\"] Network Convergence System (NCS) 2000 Series CSCwm33240 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240\"] Nexus 1000V Series Switches CSCwk79691 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691\"] Nexus 3000 Series Switches CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] Nexus 5500 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 5600 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 6000 Series Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 7000 Series Switches CSCwk70838 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838\"] Nexus 9000 Series Fabric Switches in ACI Mode CSCwk83051 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051\"] Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] PGW Packet Data Network Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] SD-WAN vEdge Routers CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] System Architecture Evolution (SAE) Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Ultra Packet Core CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Unified Computing Enterprise NFV Infrastructure Software (NFVIS) CSCwk79647 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647\"] UCS Central Software CSCwk71967 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967\"] UCS Manager CSCwk70842 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842\"] Wireless AireOS Wireless LAN Controllers CSCwk70846 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846\"] Catalyst 9800 Series Wireless Controllers CSCwk70852 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852\"]",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nNetwork Application, Service, and Acceleration\r\n\r\nNexus Dashboard Insights (On Prem)\r\nSecure Workload\r\n\r\nNetwork and Content Security Devices\r\n\r\nFirepower 4100/9300 FXOS Firepower Chassis Manager\r\nSecure Malware Analytics Appliance\r\nUmbrella Active Directory (AD) Connector\r\n\r\nNetwork Management and Provisioning\r\n\r\nCisco Evolved Programmable Network Manager (EPNM)\r\nDNA Spaces Connector\r\nPolicy Suite\r\nThousandEyes Enterprise Agent\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nUltra Cloud Core - Policy Control Function\r\n\r\nUnified Computing\r\n\r\nUCS B-Series Blade Servers\r\n\r\nWireless\r\n\r\n6300 Series Embedded Services Access Points\r\nAironet 1540 Series\r\nAironet 1560 Series\r\nAironet 1810 Series OfficeExtend Access Points\r\nAironet 1810w Series Access Points\r\nAironet 1815 Series Access Points\r\nAironet 1830 Series Access Points\r\nAironet 1850 Series Access Points\r\nAironet 2800 Series Access Points\r\nAironet 3800 Series Access Points\r\nAironet 4800 Access Points\r\nAironet 802.11ac Wave2 Access Points\r\nCatalyst 9100 Series Access Points\r\nCatalyst IW6300 Heavy Duty Series Access Points\r\nCatalyst IW9165 Heavy Duty Series\r\nCatalyst IW9165 Rugged Series\r\nCatalyst IW9167 Heavy Duty Series",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.\r\n\r\nRADIUS clients and servers configured to use DTLS or TLS over TCP are not exploitable, even if the underlying implementation is otherwise vulnerable, as long as the traffic is not sent in plaintext.\r\n\r\nCustomers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "VU#456537: RADIUS protocol susceptible to forgery attacks",
"url": "https://www.kb.cert.org/vuls/id/456537"
},
{
"category": "external",
"summary": "CSCwq90178",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq90178"
},
{
"category": "external",
"summary": "CSCwk87884",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884"
},
{
"category": "external",
"summary": "CSCwk71992",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992"
},
{
"category": "external",
"summary": "CSCwk69454",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454"
},
{
"category": "external",
"summary": "CSCwk71817",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817"
},
{
"category": "external",
"summary": "CSCwk67902",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902"
},
{
"category": "external",
"summary": "Notes",
"url": "https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024"
},
{
"category": "external",
"summary": "CSCwk67747",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747"
},
{
"category": "external",
"summary": "CSCwk70832",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832"
},
{
"category": "external",
"summary": "CSCwk70833",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833"
},
{
"category": "external",
"summary": "CSCwk67859",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859"
},
{
"category": "external",
"summary": "CSCwk73619",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619"
},
{
"category": "external",
"summary": "CSCwk70834",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834"
},
{
"category": "external",
"summary": "CSCwk70836",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836"
},
{
"category": "external",
"summary": "CSCwk70850",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850"
},
{
"category": "external",
"summary": "CSCwk70840",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840"
},
{
"category": "external",
"summary": "CSCwk79727",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727"
},
{
"category": "external",
"summary": "CSCwk70831",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"
},
{
"category": "external",
"summary": "CSCwk70845",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845"
},
{
"category": "external",
"summary": "CSCwk70854",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"
},
{
"category": "external",
"summary": "CSCwk78278",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278"
},
{
"category": "external",
"summary": "CSCwk70852",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852"
},
{
"category": "external",
"summary": "CSCwk70236",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236"
},
{
"category": "external",
"summary": "CSCwk70851",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851"
},
{
"category": "external",
"summary": "CSCwk70837",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837"
},
{
"category": "external",
"summary": "CSCwm33240",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240"
},
{
"category": "external",
"summary": "CSCwk79691",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691"
},
{
"category": "external",
"summary": "CSCwk70839",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839"
},
{
"category": "external",
"summary": "CSCwk79692",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"
},
{
"category": "external",
"summary": "CSCwk70838",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838"
},
{
"category": "external",
"summary": "CSCwk83051",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051"
},
{
"category": "external",
"summary": "CSCwk79647",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647"
},
{
"category": "external",
"summary": "CSCwk71967",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967"
},
{
"category": "external",
"summary": "CSCwk70842",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842"
},
{
"category": "external",
"summary": "CSCwk70846",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846"
},
{
"category": "external",
"summary": "fixed software releases",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"
}
],
"title": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024",
"tracking": {
"current_release_date": "2024-09-03T14:10:25+00:00",
"generator": {
"date": "2025-09-11T19:12:33+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-radius-spoofing-july-2024-87cCDwZ3",
"initial_release_date": "2024-07-10T16:00:00+00:00",
"revision_history": [
{
"date": "2024-07-10T21:54:27+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2024-07-11T21:24:06+00:00",
"number": "1.1.0",
"summary": "Updated the list of products currently under investigation."
},
{
"date": "2024-07-16T21:57:30+00:00",
"number": "1.2.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-17T21:37:05+00:00",
"number": "1.3.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-19T20:54:21+00:00",
"number": "1.4.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-24T19:33:11+00:00",
"number": "1.5.0",
"summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable."
},
{
"date": "2024-07-29T20:06:24+00:00",
"number": "1.6.0",
"summary": "Updated lists of products currently under investigation and products determined to be affected."
},
{
"date": "2024-08-02T18:48:25+00:00",
"number": "1.7.0",
"summary": "Updated summary, lists of products currently under investigation, and products determined to be affected."
},
{
"date": "2024-08-09T19:53:46+00:00",
"number": "1.8.0",
"summary": "Updated lists of products considered vulnerable and products considered not vulnerable."
},
{
"date": "2024-08-19T17:00:13+00:00",
"number": "1.9.0",
"summary": "Updated the list of products confirmed not vulnerable."
},
{
"date": "2024-09-03T14:10:25+00:00",
"number": "1.10.0",
"summary": "Added Network Convergence System 2000 Series to the list of vulnerable products."
}
],
"status": "final",
"version": "1.10.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Cisco Adaptive Security Appliance (ASA) Software",
"product": {
"name": "Cisco Adaptive Security Appliance (ASA) Software ",
"product_id": "CSAFPID-6588"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-6588"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-6588"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-6588"
]
}
],
"title": "RADIUS Vulnerability Affecting Cisco Products: July 2024"
}
]
}
cnvd-2024-33450
Vulnerability from cnvd
厂商尚未提供漏洞修补方案,请关注厂商主页及时更新: https://datatracker.ietf.org/doc/html/rfc2865
| Name | IETF RFC 2865 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-3596"
}
},
"description": "RADIUS Protocol under RFC 2865\u662fRFC\u5f00\u6e90\u7684\u4e00\u4e2a\u7f51\u7edc\u534f\u8bae\u3002\n\nRADIUS Protocol under RFC 2865\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u7528\u9488\u5bf9MD5\u54cd\u5e94\u9a8c\u8bc1\u5668\u7b7e\u540d\u7684\u9009\u62e9\u524d\u7f00\u51b2\u7a81\u653b\u51fb\uff0c\u5c06\u4efb\u4f55\u6709\u6548\u7684\u54cd\u5e94(Access-Accept, Access-Reject\u6216Access-Challenge)\u4fee\u6539\u4e3a\u4efb\u4f55\u5176\u4ed6\u54cd\u5e94\u3002",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u8865\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttps://datatracker.ietf.org/doc/html/rfc2865",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-33450",
"openTime": "2024-07-23",
"products": {
"product": "IETF RFC 2865"
},
"referenceLink": "http://www.openwall.com/lists/oss-security/2024/07/09/4",
"serverity": "\u9ad8",
"submitTime": "2024-07-23",
"title": "RADIUS Protocol under RFC 2865\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}
wid-sec-w-2024-1578
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "RADIUS ist ein Protokoll zur Authentisierung entfernter Benutzer (Remote Access Dial-In User Service).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle im RADIUS Protokoll ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- Hardware Appliance\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1578 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1578.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1578 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1578"
},
{
"category": "external",
"summary": "Blast-RADIUS vom 2024-07-09",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "CERT CC VU#456537 vom 2024-07-09",
"url": "https://kb.cert.org/vuls/id/456537"
},
{
"category": "external",
"summary": "freeradius Security vom 2024-07-09",
"url": "http://freeradius.org/security/"
},
{
"category": "external",
"summary": "LANCOM Sicherheitshinweise vom 2024-07-09",
"url": "https://www.lancom-systems.de/service-support/soforthilfe/allgemeine-sicherheitshinweise/"
},
{
"category": "external",
"summary": "Arista Security Advisory 0101 vom 2024-07-09",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19905-security-advisory-0101"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C395D8FEF4 vom 2024-07-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c395d8fef4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2359-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2366-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018904.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2361-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2367-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018903.html"
},
{
"category": "external",
"summary": "Palo Alto Networks Security Advisory PAN-247511 vom 2024-07-10",
"url": "https://security.paloaltonetworks.com/CVE-2024-3596"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Lancom Advisory",
"url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04662en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "SonicWall Security Advisory SNWLID-2024-0014 vom 2024-07-23",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4828 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4829 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4826 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4874 vom 2024-07-26",
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "external",
"summary": "Cisco Security Bulletin",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4911 vom 2024-07-30",
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4912 vom 2024-07-30",
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4913 vom 2024-07-30",
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "external",
"summary": "HPE Security Advisory vom 2024-07-30",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04675en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4936 vom 2024-07-31",
"url": "https://linux.oracle.com/errata/ELSA-2024-4936.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4936 vom 2024-07-31",
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4935 vom 2024-08-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-4935.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4935 vom 2024-07-31",
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4935 vom 2024-08-01",
"url": "https://errata.build.resf.org/RLSA-2024:4935"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4936 vom 2024-08-01",
"url": "https://errata.build.resf.org/RLSA-2024:4936"
},
{
"category": "external",
"summary": "Micro Focus Security Bulletin KM00002914 vom 2024-08-06",
"url": "https://www.netiq.com/documentation/advanced-authentication-64/advanced-authentication-releasenotes-6432/data/advanced-authentication-releasenotes-6432.html"
},
{
"category": "external",
"summary": "Alcatel-Lucent Security Advisory SA-N0139 vom 2024-08-13",
"url": "https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-n0139_radius_protocol_vulnerability_ed01.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2611 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2611.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20240822-0001 vom 2024-08-22",
"url": "https://security.netapp.com/advisory/ntap-20240822-0001/"
},
{
"category": "external",
"summary": "Cambium Security Notification vom 2024-08-28",
"url": "https://www.cambiumnetworks.com/wp-content/uploads/Security-Notification-CVE-2024-3596.pdf"
},
{
"category": "external",
"summary": "F5 Security Advisory K000141008 vom 2024-09-09",
"url": "https://my.f5.com/manage/s/article/K000141008"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2024-2632 vom 2024-09-24",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25028"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4911 vom 2024-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-4911.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA88210 vom 2023-10-02",
"url": "https://supportportal.juniper.net/s/article/2024-09-30-Out-of-Cycle-Security-Advisory-Multiple-Products-RADIUS-protocol-susceptible-to-forgery-attacks-Blast-RADIUS-CVE-2024-3596"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7055-1 vom 2024-10-03",
"url": "https://ubuntu.com/security/notices/USN-7055-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8461 vom 2024-10-24",
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8577 vom 2024-10-29",
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-862F5C4156 vom 2024-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-862f5c4156"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C0961D31B8 vom 2024-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c0961d31b8"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-29A74AC2B0 vom 2024-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-29a74ac2b0"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8788 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8789 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8792 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8791 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8794 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8860 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8860 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8860.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9474 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9547 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9583 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9583"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9474 vom 2024-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2024-9474.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8788 vom 2024-12-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-8788.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178065 vom 2024-12-06",
"url": "https://www.ibm.com/support/pages/node/7178065"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11109 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "external",
"summary": "FortiGuard Labs PSIRT Advisory FG-IR-24-255 vom 2025-01-14",
"url": "https://www.fortiguard.com/psirt/FG-IR-24-255"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10990 vom 2025-01-15",
"url": "https://access.redhat.com/errata/RHSA-2024:10990"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7257-1 vom 2025-02-05",
"url": "https://ubuntu.com/security/notices/USN-7257-1"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-794185 vom 2025-05-13",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBUX04931 vom 2025-08-25",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04931en_us\u0026docLocale=en_US"
}
],
"source_lang": "en-US",
"title": "RADIUS: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-08-25T22:00:00.000+00:00",
"generator": {
"date": "2025-08-26T06:35:37.085+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1578",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Palo Alto Networks aufgenommen"
},
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-07-21T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Cisco"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SonicWall aufgenommen"
},
{
"date": "2024-07-24T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-25T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux, Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Micro Focus aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Alcatel-Lucent aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-09-09T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und Juniper aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-24T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-29T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Fortinet aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Siemens aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von HP aufgenommen"
}
],
"status": "final",
"version": "36"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Alcatel Lucent Enterprise OmniSwitch",
"product": {
"name": "Alcatel Lucent Enterprise OmniSwitch",
"product_id": "T017286",
"product_identification_helper": {
"cpe": "cpe:/h:alcatel-lucent:omniswitch:-"
}
}
}
],
"category": "vendor",
"name": "Alcatel Lucent Enterprise"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Arista EOS",
"product": {
"name": "Arista EOS",
"product_id": "T007958",
"product_identification_helper": {
"cpe": "cpe:/o:arista:arista_eos:-"
}
}
},
{
"category": "product_name",
"name": "Arista WiFi Access Point",
"product": {
"name": "Arista WiFi Access Point",
"product_id": "T019358",
"product_identification_helper": {
"cpe": "cpe:/h:arista:wifi_access_point:-"
}
}
}
],
"category": "vendor",
"name": "Arista"
},
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T021926",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Aruba ClearPass Policy Manager",
"product": {
"name": "Aruba ClearPass Policy Manager",
"product_id": "T023403",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.12.2",
"product": {
"name": "Aruba ClearPass Policy Manager \u003c6.12.2",
"product_id": "T036501"
}
},
{
"category": "product_version",
"name": "6.12.2",
"product": {
"name": "Aruba ClearPass Policy Manager 6.12.2",
"product_id": "T036501-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.12.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.11.9",
"product": {
"name": "Aruba ClearPass Policy Manager \u003c6.11.9",
"product_id": "T036502"
}
},
{
"category": "product_version",
"name": "6.11.9",
"product": {
"name": "Aruba ClearPass Policy Manager 6.11.9",
"product_id": "T036502-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.11.9"
}
}
}
],
"category": "product_name",
"name": "ClearPass Policy Manager"
},
{
"category": "product_name",
"name": "Aruba EdgeConnect",
"product": {
"name": "Aruba EdgeConnect",
"product_id": "T027755",
"product_identification_helper": {
"cpe": "cpe:/a:aruba:edgeconnect:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T022212",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
},
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "product_name",
"name": "Brocade SANnav"
},
{
"category": "product_name",
"name": "Broadcom Fabric OS",
"product": {
"name": "Broadcom Fabric OS",
"product_id": "978054",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Cambium Networks cnPilot",
"product": {
"name": "Cambium Networks cnPilot",
"product_id": "T037142",
"product_identification_helper": {
"cpe": "cpe:/h:cambiumnetworks:cnpilot:-"
}
}
}
],
"category": "vendor",
"name": "Cambium Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco ASA (Adaptive Security Appliance)",
"product": {
"name": "Cisco ASA (Adaptive Security Appliance)",
"product_id": "T035033",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:adaptive_security_appliance:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Application Policy Infrastructure Controller",
"product": {
"name": "Cisco Application Policy Infrastructure Controller",
"product_id": "778219",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:application_policy_infrastructure_controller:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Catalyst SD-WAN Manager",
"product": {
"name": "Cisco Catalyst SD-WAN Manager",
"product_id": "1487015",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:catalyst_sd-wan_manager:20.11.1.2"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Management Center",
"product": {
"name": "Cisco Firepower Management Center",
"product_id": "T016458",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:management_center"
}
}
},
{
"category": "product_version",
"name": "Device Manager",
"product": {
"name": "Cisco Firepower Device Manager",
"product_id": "T016459",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:device_manager"
}
}
},
{
"category": "product_version",
"name": "Threat Defense",
"product": {
"name": "Cisco Firepower Threat Defense",
"product_id": "T029736",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:threat_defense"
}
}
}
],
"category": "product_name",
"name": "Firepower"
},
{
"category": "product_name",
"name": "Cisco IOS",
"product": {
"name": "Cisco IOS",
"product_id": "T034297",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IOS XE",
"product": {
"name": "Cisco IOS XE",
"product_id": "T030538",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios_xe:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IOS XR",
"product": {
"name": "Cisco IOS XR",
"product_id": "2062",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios_xr:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Identity Services Engine (ISE)",
"product": {
"name": "Cisco Identity Services Engine (ISE)",
"product_id": "T000612",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:identity_services_engine_software:-"
}
}
},
{
"category": "product_name",
"name": "Cisco MDS 9000",
"product": {
"name": "Cisco MDS 9000",
"product_id": "T001069",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:mds_9000:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "3000",
"product": {
"name": "Cisco Nexus 3000",
"product_id": "T003851",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:3000"
}
}
},
{
"category": "product_version",
"name": "9000",
"product": {
"name": "Cisco Nexus 9000",
"product_id": "T003853",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:9000"
}
}
},
{
"category": "product_version",
"name": "7000",
"product": {
"name": "Cisco Nexus 7000",
"product_id": "T009516",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:7000"
}
}
}
],
"category": "product_name",
"name": "Nexus"
},
{
"category": "product_name",
"name": "Cisco Nexus Dashboard",
"product": {
"name": "Cisco Nexus Dashboard",
"product_id": "1202977",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:nexus_dashboard:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Prime Infrastructure",
"product": {
"name": "Cisco Prime Infrastructure",
"product_id": "T000756",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:prime_infrastructure:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Router",
"product": {
"name": "Cisco Router",
"product_id": "T003258",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:-"
}
}
},
{
"category": "product_version",
"name": "ASR 5000",
"product": {
"name": "Cisco Router ASR 5000",
"product_id": "T007902",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:asr_5000"
}
}
}
],
"category": "product_name",
"name": "Router"
},
{
"category": "product_name",
"name": "Cisco SD-WAN",
"product": {
"name": "Cisco SD-WAN",
"product_id": "T015770",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:sd_wan:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Secure Email Gateway",
"product": {
"name": "Cisco Secure Email Gateway",
"product_id": "1269011",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:secure_email_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Secure Web Appliance",
"product": {
"name": "Cisco Secure Web Appliance",
"product_id": "T034850",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:secure_web_appliance:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Central Software",
"product": {
"name": "Cisco Unified Computing System (UCS) Central Software",
"product_id": "T021359",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:central_software"
}
}
},
{
"category": "product_version",
"name": "Manager",
"product": {
"name": "Cisco Unified Computing System (UCS) Manager",
"product_id": "T036384",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:manager"
}
}
}
],
"category": "product_name",
"name": "Unified Computing System (UCS)"
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2.0",
"product": {
"name": "Fortinet FortiAuthenticator \u003c6.2.0",
"product_id": "1002222"
}
},
{
"category": "product_version",
"name": "6.2.0",
"product": {
"name": "Fortinet FortiAuthenticator 6.2.0",
"product_id": "1002222-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fortinet:fortiauthenticator:6.2.0"
}
}
}
],
"category": "product_name",
"name": "FortiAuthenticator"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.4.0",
"product": {
"name": "Fortinet FortiOS \u003c7.4.0",
"product_id": "1497663"
}
},
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Fortinet FortiOS 7.4.0",
"product_id": "1497663-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:fortinet:fortios:7.4.0"
}
}
}
],
"category": "product_name",
"name": "FortiOS"
}
],
"category": "vendor",
"name": "Fortinet"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11i v3",
"product": {
"name": "HPE HP-UX 11i v3",
"product_id": "T046489",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:11i_v3"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM MQ",
"product": {
"name": "IBM MQ",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c21.4R3-S9",
"product": {
"name": "Juniper JUNOS \u003c21.4R3-S9",
"product_id": "T037890"
}
},
{
"category": "product_version",
"name": "21.4R3-S9",
"product": {
"name": "Juniper JUNOS 21.4R3-S9",
"product_id": "T037890-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:21.4r3-s9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.2R3-S5",
"product": {
"name": "Juniper JUNOS \u003c22.2R3-S5",
"product_id": "T037891"
}
},
{
"category": "product_version",
"name": "22.2R3-S5",
"product": {
"name": "Juniper JUNOS 22.2R3-S5",
"product_id": "T037891-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.2r3-s5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.4R3-S5",
"product": {
"name": "Juniper JUNOS \u003c22.4R3-S5",
"product_id": "T037892"
}
},
{
"category": "product_version",
"name": "22.4R3-S5",
"product": {
"name": "Juniper JUNOS 22.4R3-S5",
"product_id": "T037892-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.4r3-s5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.2R2-S3",
"product": {
"name": "Juniper JUNOS \u003c23.2R2-S3",
"product_id": "T037893"
}
},
{
"category": "product_version",
"name": "23.2R2-S3",
"product": {
"name": "Juniper JUNOS 23.2R2-S3",
"product_id": "T037893-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.2r2-s3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.4R2-S3",
"product": {
"name": "Juniper JUNOS \u003c23.4R2-S3",
"product_id": "T037894"
}
},
{
"category": "product_version",
"name": "23.4R2-S3",
"product": {
"name": "Juniper JUNOS 23.4R2-S3",
"product_id": "T037894-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.4r2-s3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.2R2",
"product": {
"name": "Juniper JUNOS \u003c24.2R2",
"product_id": "T037895"
}
},
{
"category": "product_version",
"name": "24.2R2",
"product": {
"name": "Juniper JUNOS 24.2R2",
"product_id": "T037895-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:24.2r2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c21.4R3-S9-EVO",
"product": {
"name": "Juniper JUNOS \u003c21.4R3-S9-EVO",
"product_id": "T037899"
}
},
{
"category": "product_version",
"name": "21.4R3-S9-EVO",
"product": {
"name": "Juniper JUNOS 21.4R3-S9-EVO",
"product_id": "T037899-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:21.4r3-s9-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.2R3-S5-EVO",
"product": {
"name": "Juniper JUNOS \u003c22.2R3-S5-EVO",
"product_id": "T037900"
}
},
{
"category": "product_version",
"name": "22.2R3-S5-EVO",
"product": {
"name": "Juniper JUNOS 22.2R3-S5-EVO",
"product_id": "T037900-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.2r3-s5-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.3R3-S4-EVO",
"product": {
"name": "Juniper JUNOS \u003c22.3R3-S4-EVO",
"product_id": "T037901"
}
},
{
"category": "product_version",
"name": "22.3R3-S4-EVO",
"product": {
"name": "Juniper JUNOS 22.3R3-S4-EVO",
"product_id": "T037901-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.3r3-s4-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.4R3-S5-EVO",
"product": {
"name": "Juniper JUNOS \u003c22.4R3-S5-EVO",
"product_id": "T037902"
}
},
{
"category": "product_version",
"name": "22.4R3-S5-EVO",
"product": {
"name": "Juniper JUNOS 22.4R3-S5-EVO",
"product_id": "T037902-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.4r3-s5-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.2R2-S3-EVO",
"product": {
"name": "Juniper JUNOS \u003c23.2R2-S3-EVO",
"product_id": "T037903"
}
},
{
"category": "product_version",
"name": "23.2R2-S3-EVO",
"product": {
"name": "Juniper JUNOS 23.2R2-S3-EVO",
"product_id": "T037903-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.2r2-s3-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.4R2-S3-EVO",
"product": {
"name": "Juniper JUNOS \u003c23.4R2-S3-EVO",
"product_id": "T037904"
}
},
{
"category": "product_version",
"name": "23.4R2-S3-EVO",
"product": {
"name": "Juniper JUNOS 23.4R2-S3-EVO",
"product_id": "T037904-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.4r2-s3-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.2R2-EVO",
"product": {
"name": "Juniper JUNOS \u003c24.2R2-EVO",
"product_id": "T037905"
}
},
{
"category": "product_version",
"name": "24.2R2-EVO",
"product": {
"name": "Juniper JUNOS 24.2R2-EVO",
"product_id": "T037905-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:24.2r2-evo"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "LANCOM Access Point",
"product": {
"name": "LANCOM Access Point",
"product_id": "T035952",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:access_point:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.50 RU14",
"product": {
"name": "LANCOM LCOS \u003c10.50 RU14",
"product_id": "T035940"
}
},
{
"category": "product_version",
"name": "10.50 RU14",
"product": {
"name": "LANCOM LCOS 10.50 RU14",
"product_id": "T035940-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:10.50_ru14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.72 RU8",
"product": {
"name": "LANCOM LCOS \u003c10.72 RU8",
"product_id": "T035941"
}
},
{
"category": "product_version",
"name": "10.72 RU8",
"product": {
"name": "LANCOM LCOS 10.72 RU8",
"product_id": "T035941-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:10.72_ru8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.80 RU6",
"product": {
"name": "LANCOM LCOS \u003c10.80 RU6",
"product_id": "T035942"
}
},
{
"category": "product_version",
"name": "10.80 RU6",
"product": {
"name": "LANCOM LCOS 10.80 RU6",
"product_id": "T035942-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:10.80_ru6"
}
}
},
{
"category": "product_version_range",
"name": "LX \u003c6.20",
"product": {
"name": "LANCOM LCOS LX \u003c6.20",
"product_id": "T035945"
}
},
{
"category": "product_version",
"name": "LX 6.20",
"product": {
"name": "LANCOM LCOS LX 6.20",
"product_id": "T035945-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:6.20::lx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c3.34 SU8",
"product": {
"name": "LANCOM LCOS SX \u003c3.34 SU8",
"product_id": "T035947"
}
},
{
"category": "product_version",
"name": "SX 3.34 SU8",
"product": {
"name": "LANCOM LCOS SX 3.34 SU8",
"product_id": "T035947-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:3.34:su8:sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c4.00 SU13",
"product": {
"name": "LANCOM LCOS SX \u003c4.00 SU13",
"product_id": "T035948"
}
},
{
"category": "product_version",
"name": "SX 4.00 SU13",
"product": {
"name": "LANCOM LCOS SX 4.00 SU13",
"product_id": "T035948-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:4.00:su13:sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c4.20 SU3",
"product": {
"name": "LANCOM LCOS SX \u003c4.20 SU3",
"product_id": "T035949"
}
},
{
"category": "product_version",
"name": "SX 4.20 SU3",
"product": {
"name": "LANCOM LCOS SX 4.20 SU3",
"product_id": "T035949-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:4.20:su3:sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c4.30",
"product": {
"name": "LANCOM LCOS SX \u003c4.30",
"product_id": "T035950"
}
},
{
"category": "product_version",
"name": "SX 4.30",
"product": {
"name": "LANCOM LCOS SX 4.30",
"product_id": "T035950-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:4.30::sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c5.20 SU9",
"product": {
"name": "LANCOM LCOS SX \u003c5.20 SU9",
"product_id": "T035951"
}
},
{
"category": "product_version",
"name": "SX 5.20 SU9",
"product": {
"name": "LANCOM LCOS SX 5.20 SU9",
"product_id": "T035951-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:5.20:su9:sx"
}
}
}
],
"category": "product_name",
"name": "LCOS"
},
{
"category": "product_name",
"name": "LANCOM Router",
"product": {
"name": "LANCOM Router",
"product_id": "T019305",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:router:-"
}
}
},
{
"category": "product_name",
"name": "LANCOM Switch",
"product": {
"name": "LANCOM Switch",
"product_id": "T035953",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:switch:-"
}
}
}
],
"category": "vendor",
"name": "LANCOM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.4 Service Pack 3 Patch 2",
"product": {
"name": "Micro Focus NetIQ Advanced Authentication \u003c6.4 Service Pack 3 Patch 2",
"product_id": "T036618"
}
},
{
"category": "product_version",
"name": "6.4 Service Pack 3 Patch 2",
"product": {
"name": "Micro Focus NetIQ Advanced Authentication 6.4 Service Pack 3 Patch 2",
"product_id": "T036618-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microfocus:netiq_advanced_authentication:6.4_service_pack_3_patch_2"
}
}
}
],
"category": "product_name",
"name": "NetIQ Advanced Authentication"
}
],
"category": "vendor",
"name": "Micro Focus"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.0.27",
"product": {
"name": "Open Source FreeRADIUS \u003c3.0.27",
"product_id": "T035938"
}
},
{
"category": "product_version",
"name": "3.0.27",
"product": {
"name": "Open Source FreeRADIUS 3.0.27",
"product_id": "T035938-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:freeradius:freeradius:3.0.27"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.2.5",
"product": {
"name": "Open Source FreeRADIUS \u003c3.2.5",
"product_id": "T035939"
}
},
{
"category": "product_version",
"name": "3.2.5",
"product": {
"name": "Open Source FreeRADIUS 3.2.5",
"product_id": "T035939-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:freeradius:freeradius:3.2.5"
}
}
}
],
"category": "product_name",
"name": "FreeRADIUS"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.2",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c11.2",
"product_id": "T036074"
}
},
{
"category": "product_version",
"name": "11.2",
"product": {
"name": "Palo Alto Networks PAN-OS 11.2",
"product_id": "T036074-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:11.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.1.3",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c11.1.3",
"product_id": "T036075"
}
},
{
"category": "product_version",
"name": "11.1.3",
"product": {
"name": "Palo Alto Networks PAN-OS 11.1.3",
"product_id": "T036075-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:11.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.4-h4",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c11.0.4-h4",
"product_id": "T036076"
}
},
{
"category": "product_version",
"name": "11.0.4-h4",
"product": {
"name": "Palo Alto Networks PAN-OS 11.0.4-h4",
"product_id": "T036076-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:11.0.4-h4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.2.10",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c10.2.10",
"product_id": "T036077"
}
},
{
"category": "product_version",
"name": "10.2.10",
"product": {
"name": "Palo Alto Networks PAN-OS 10.2.10",
"product_id": "T036077-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.10"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.14",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c10.1.14",
"product_id": "T036078"
}
},
{
"category": "product_version",
"name": "10.1.14",
"product": {
"name": "Palo Alto Networks PAN-OS 10.1.14",
"product_id": "T036078-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:10.1.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.19",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c9.1.19",
"product_id": "T036079"
}
},
{
"category": "product_version",
"name": "9.1.19",
"product": {
"name": "Palo Alto Networks PAN-OS 9.1.19",
"product_id": "T036079-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:9.1.19"
}
}
}
],
"category": "product_name",
"name": "PAN-OS"
}
],
"category": "vendor",
"name": "Palo Alto Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "Logging \u003c5.9.10",
"product": {
"name": "Red Hat OpenShift Logging \u003c5.9.10",
"product_id": "T040352"
}
},
{
"category": "product_version",
"name": "Logging 5.9.10",
"product": {
"name": "Red Hat OpenShift Logging 5.9.10",
"product_id": "T040352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging__5.9.10"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "GridPass \u003c2.50",
"product": {
"name": "Siemens SICAM GridPass \u003c2.50",
"product_id": "T043580"
}
},
{
"category": "product_version",
"name": "GridPass 2.50",
"product": {
"name": "Siemens SICAM GridPass 2.50",
"product_id": "T043580-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:sicam:gridpass__2.50"
}
}
}
],
"category": "product_name",
"name": "SICAM"
},
{
"branches": [
{
"category": "product_version",
"name": "5",
"product": {
"name": "Siemens SIPROTEC 5",
"product_id": "T025552",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:siprotec:5"
}
}
}
],
"category": "product_name",
"name": "SIPROTEC"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "SonicWall Global VPN Client",
"product": {
"name": "SonicWall Global VPN Client",
"product_id": "829390",
"product_identification_helper": {
"cpe": "cpe:/a:sonicwall:global_vpn_client:-"
}
}
}
],
"category": "vendor",
"name": "SonicWall"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"product_status": {
"known_affected": [
"T036502",
"T016459",
"T016458",
"T021926",
"1202977",
"T007902",
"T036501",
"T004914",
"T036384",
"T000756",
"T027755",
"T029736",
"398363",
"T035942",
"T035941",
"T035948",
"T003851",
"T035947",
"T003258",
"T009516",
"T003853",
"T035945",
"T034297",
"T036076",
"T035940",
"T034850",
"T036077",
"T017286",
"T036078",
"T036079",
"T036074",
"T036075",
"T002207",
"T019305",
"T023403",
"T035939",
"T035938",
"829390",
"T035953",
"T035952",
"1002222",
"T037899",
"67646",
"T037895",
"T035033",
"T036688",
"T037891",
"T035951",
"T037892",
"T035950",
"1487015",
"T037893",
"T037894",
"978054",
"T019358",
"T037890",
"T000612",
"T021359",
"T030538",
"1497663",
"T001069",
"T001663",
"T043580",
"1269011",
"T035949",
"T025552",
"T040352",
"T037903",
"T037904",
"T036618",
"T037905",
"T037900",
"T037901",
"T037902",
"T007958",
"2062",
"T032255",
"74185",
"T015770",
"T037142",
"T034392",
"T000126",
"778219",
"T022212",
"T046489"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
}
]
}
wid-sec-w-2024-1579
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1579 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1579.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1579 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1579"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-07-09",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-307 vom 2024-08-09",
"url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2024/07.html"
},
{
"category": "external",
"summary": "Exploit CVE-2024-38054 vom 2024-08-22",
"url": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-05T22:00:00.000+00:00",
"generator": {
"date": "2024-09-06T08:13:56.495+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-1579",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Hinweis auf Ausnutzung von zwei CVE erg\u00e4nzt"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "4",
"summary": "Exploit f\u00fcr CVE-2024-38054 aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Storage",
"product": {
"name": "Hitachi Storage",
"product_id": "T009295",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:storage:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Version 1607",
"product": {
"name": "Microsoft Windows 10 Version 1607",
"product_id": "T011520",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1607"
}
}
},
{
"category": "product_version",
"name": "Version 21H2",
"product": {
"name": "Microsoft Windows 10 Version 21H2",
"product_id": "T021306",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_21h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 10 Version 22H2",
"product_id": "T025256",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_22h2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T025566",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:windows_terminal"
}
}
},
{
"category": "product_version",
"name": "Version 1809",
"product": {
"name": "Microsoft Windows 10 Version 1809",
"product_id": "T034033",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1809"
}
}
}
],
"category": "product_name",
"name": "Windows 10"
},
{
"branches": [
{
"category": "product_version",
"name": "Version 23H2",
"product": {
"name": "Microsoft Windows 11 Version 23H2",
"product_id": "T031172",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_23h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 11 Version 22H2",
"product_id": "T034034",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_22h2"
}
}
},
{
"category": "product_version_range",
"name": "version 21H2",
"product": {
"name": "Microsoft Windows 11 version 21H2",
"product_id": "T034035"
}
}
],
"category": "product_name",
"name": "Windows 11"
},
{
"branches": [
{
"category": "product_version",
"name": "2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "T012853",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_sp2"
}
}
},
{
"category": "product_version",
"name": "2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T012855",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1"
}
}
}
],
"category": "product_name",
"name": "Windows Server"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T006125",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:::server_core_installation"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T014786",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008900",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:server_2016:r2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T014557",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:server_core_installation"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows Server 2022",
"product": {
"name": "Microsoft Windows Server 2022",
"product_id": "T025255",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:datacenter_azure_edition"
}
}
},
{
"category": "product_version",
"name": "23H2 Edition",
"product": {
"name": "Microsoft Windows Server 2022 23H2 Edition",
"product_id": "T034036",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server",
"product": {
"name": "Xerox FreeFlow Print Server",
"product_id": "T010509",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:-"
}
}
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-26184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-28899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-30081",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37969",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37971",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37974",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37975",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37977",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-37978",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37978"
},
{
"cve": "CVE-2024-37981",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37984",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37985",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37986",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-37988",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38015",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38017",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38022",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38027",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38031",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38032",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38033",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38034",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38044",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38047",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38051",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38052",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38054",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38057",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38059",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38065",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38067",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38068",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38073",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38077",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38078",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-38079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38080",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-38085",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38099",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38100",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38101",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38102",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-38105",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-38112",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38112"
},
{
"cve": "CVE-2024-38517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-39684",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-39684"
}
]
}
wid-sec-w-2024-3684
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3684 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3684.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3684 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3684"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-12-11",
"url": "https://www.ibm.com/support/pages/node/7178556"
}
],
"source_lang": "en-US",
"title": "IBM QRadar SIEM: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-11T23:00:00.000+00:00",
"generator": {
"date": "2024-12-12T09:36:59.736+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3684",
"initial_release_date": "2024-12-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF02",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF02",
"product_id": "T039813"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF02",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF02",
"product_id": "T039813-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if02"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12900",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2021-22569",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2021-22569"
},
{
"cve": "CVE-2022-3171",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-31582",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-31582"
},
{
"cve": "CVE-2023-33546",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-33546"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-36478",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-36478"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2024-10041",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-10041"
},
{
"cve": "CVE-2024-10963",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-10963"
},
{
"cve": "CVE-2024-23454",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-23454"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-45491",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-51504",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-52316",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-52316"
},
{
"cve": "CVE-2024-52317",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-52317"
},
{
"cve": "CVE-2024-52318",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039813"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-52318"
}
]
}
WID-SEC-W-2024-1579
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1579 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1579.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1579 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1579"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-07-09",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-307 vom 2024-08-09",
"url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2024/07.html"
},
{
"category": "external",
"summary": "Exploit CVE-2024-38054 vom 2024-08-22",
"url": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-05T22:00:00.000+00:00",
"generator": {
"date": "2024-09-06T08:13:56.495+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-1579",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Hinweis auf Ausnutzung von zwei CVE erg\u00e4nzt"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "4",
"summary": "Exploit f\u00fcr CVE-2024-38054 aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Storage",
"product": {
"name": "Hitachi Storage",
"product_id": "T009295",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:storage:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Version 1607",
"product": {
"name": "Microsoft Windows 10 Version 1607",
"product_id": "T011520",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1607"
}
}
},
{
"category": "product_version",
"name": "Version 21H2",
"product": {
"name": "Microsoft Windows 10 Version 21H2",
"product_id": "T021306",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_21h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 10 Version 22H2",
"product_id": "T025256",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_22h2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T025566",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:windows_terminal"
}
}
},
{
"category": "product_version",
"name": "Version 1809",
"product": {
"name": "Microsoft Windows 10 Version 1809",
"product_id": "T034033",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1809"
}
}
}
],
"category": "product_name",
"name": "Windows 10"
},
{
"branches": [
{
"category": "product_version",
"name": "Version 23H2",
"product": {
"name": "Microsoft Windows 11 Version 23H2",
"product_id": "T031172",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_23h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 11 Version 22H2",
"product_id": "T034034",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_22h2"
}
}
},
{
"category": "product_version_range",
"name": "version 21H2",
"product": {
"name": "Microsoft Windows 11 version 21H2",
"product_id": "T034035"
}
}
],
"category": "product_name",
"name": "Windows 11"
},
{
"branches": [
{
"category": "product_version",
"name": "2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "T012853",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_sp2"
}
}
},
{
"category": "product_version",
"name": "2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T012855",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1"
}
}
}
],
"category": "product_name",
"name": "Windows Server"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T006125",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:::server_core_installation"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T014786",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008900",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:server_2016:r2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T014557",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:server_core_installation"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows Server 2022",
"product": {
"name": "Microsoft Windows Server 2022",
"product_id": "T025255",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:datacenter_azure_edition"
}
}
},
{
"category": "product_version",
"name": "23H2 Edition",
"product": {
"name": "Microsoft Windows Server 2022 23H2 Edition",
"product_id": "T034036",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server",
"product": {
"name": "Xerox FreeFlow Print Server",
"product_id": "T010509",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:-"
}
}
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21417",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-21417"
},
{
"cve": "CVE-2024-26184",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-26184"
},
{
"cve": "CVE-2024-28899",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-28899"
},
{
"cve": "CVE-2024-30013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30013"
},
{
"cve": "CVE-2024-30071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30071"
},
{
"cve": "CVE-2024-30079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30079"
},
{
"cve": "CVE-2024-30081",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30081"
},
{
"cve": "CVE-2024-30098",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-30098"
},
{
"cve": "CVE-2024-35270",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-35270"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37969",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37969"
},
{
"cve": "CVE-2024-37970",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37970"
},
{
"cve": "CVE-2024-37971",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37971"
},
{
"cve": "CVE-2024-37972",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37972"
},
{
"cve": "CVE-2024-37973",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37973"
},
{
"cve": "CVE-2024-37974",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37974"
},
{
"cve": "CVE-2024-37975",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37975"
},
{
"cve": "CVE-2024-37977",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37977"
},
{
"cve": "CVE-2024-37978",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37978"
},
{
"cve": "CVE-2024-37981",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37981"
},
{
"cve": "CVE-2024-37984",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37984"
},
{
"cve": "CVE-2024-37985",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37985"
},
{
"cve": "CVE-2024-37986",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37986"
},
{
"cve": "CVE-2024-37987",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37987"
},
{
"cve": "CVE-2024-37988",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37988"
},
{
"cve": "CVE-2024-37989",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-37989"
},
{
"cve": "CVE-2024-38010",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38010"
},
{
"cve": "CVE-2024-38011",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38011"
},
{
"cve": "CVE-2024-38013",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38013"
},
{
"cve": "CVE-2024-38015",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38015"
},
{
"cve": "CVE-2024-38017",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38017"
},
{
"cve": "CVE-2024-38019",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38019"
},
{
"cve": "CVE-2024-38022",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38022"
},
{
"cve": "CVE-2024-38025",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38025"
},
{
"cve": "CVE-2024-38027",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38027"
},
{
"cve": "CVE-2024-38028",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38028"
},
{
"cve": "CVE-2024-38030",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38030"
},
{
"cve": "CVE-2024-38031",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38031"
},
{
"cve": "CVE-2024-38032",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38032"
},
{
"cve": "CVE-2024-38033",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38033"
},
{
"cve": "CVE-2024-38034",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38034"
},
{
"cve": "CVE-2024-38041",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38041"
},
{
"cve": "CVE-2024-38043",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38043"
},
{
"cve": "CVE-2024-38044",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38044"
},
{
"cve": "CVE-2024-38047",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38047"
},
{
"cve": "CVE-2024-38048",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38048"
},
{
"cve": "CVE-2024-38049",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38049"
},
{
"cve": "CVE-2024-38050",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38050"
},
{
"cve": "CVE-2024-38051",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38051"
},
{
"cve": "CVE-2024-38052",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38052"
},
{
"cve": "CVE-2024-38053",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38053"
},
{
"cve": "CVE-2024-38054",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38054"
},
{
"cve": "CVE-2024-38055",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38055"
},
{
"cve": "CVE-2024-38056",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38056"
},
{
"cve": "CVE-2024-38057",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38057"
},
{
"cve": "CVE-2024-38058",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38058"
},
{
"cve": "CVE-2024-38059",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38059"
},
{
"cve": "CVE-2024-38060",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38060"
},
{
"cve": "CVE-2024-38061",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38061"
},
{
"cve": "CVE-2024-38062",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38062"
},
{
"cve": "CVE-2024-38064",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38064"
},
{
"cve": "CVE-2024-38065",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38065"
},
{
"cve": "CVE-2024-38066",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38066"
},
{
"cve": "CVE-2024-38067",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38067"
},
{
"cve": "CVE-2024-38068",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38068"
},
{
"cve": "CVE-2024-38069",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38069"
},
{
"cve": "CVE-2024-38070",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38070"
},
{
"cve": "CVE-2024-38071",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38071"
},
{
"cve": "CVE-2024-38072",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38072"
},
{
"cve": "CVE-2024-38073",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38073"
},
{
"cve": "CVE-2024-38074",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38074"
},
{
"cve": "CVE-2024-38076",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38076"
},
{
"cve": "CVE-2024-38077",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38077"
},
{
"cve": "CVE-2024-38078",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38078"
},
{
"cve": "CVE-2024-38079",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38079"
},
{
"cve": "CVE-2024-38080",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38080"
},
{
"cve": "CVE-2024-38085",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38085"
},
{
"cve": "CVE-2024-38091",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38091"
},
{
"cve": "CVE-2024-38099",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38099"
},
{
"cve": "CVE-2024-38100",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38100"
},
{
"cve": "CVE-2024-38101",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38101"
},
{
"cve": "CVE-2024-38102",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38102"
},
{
"cve": "CVE-2024-38104",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38104"
},
{
"cve": "CVE-2024-38105",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38105"
},
{
"cve": "CVE-2024-38112",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38112"
},
{
"cve": "CVE-2024-38517",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-38517"
},
{
"cve": "CVE-2024-39684",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T006125",
"T012855",
"T014557",
"T008900",
"T012853",
"T034033",
"T014786",
"T011520",
"T031172",
"T034036",
"T034035",
"T034034",
"T021306",
"T025256",
"T009295",
"T025566",
"T010509",
"T025255"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-39684"
}
]
}
WID-SEC-W-2024-1578
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "RADIUS ist ein Protokoll zur Authentisierung entfernter Benutzer (Remote Access Dial-In User Service).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle im RADIUS Protokoll ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- Hardware Appliance\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1578 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1578.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1578 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1578"
},
{
"category": "external",
"summary": "Blast-RADIUS vom 2024-07-09",
"url": "https://www.blastradius.fail/"
},
{
"category": "external",
"summary": "CERT CC VU#456537 vom 2024-07-09",
"url": "https://kb.cert.org/vuls/id/456537"
},
{
"category": "external",
"summary": "freeradius Security vom 2024-07-09",
"url": "http://freeradius.org/security/"
},
{
"category": "external",
"summary": "LANCOM Sicherheitshinweise vom 2024-07-09",
"url": "https://www.lancom-systems.de/service-support/soforthilfe/allgemeine-sicherheitshinweise/"
},
{
"category": "external",
"summary": "Arista Security Advisory 0101 vom 2024-07-09",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19905-security-advisory-0101"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C395D8FEF4 vom 2024-07-09",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c395d8fef4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2359-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2366-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018904.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2361-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2367-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018903.html"
},
{
"category": "external",
"summary": "Palo Alto Networks Security Advisory PAN-247511 vom 2024-07-10",
"url": "https://security.paloaltonetworks.com/CVE-2024-3596"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Lancom Advisory",
"url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04662en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "SonicWall Security Advisory SNWLID-2024-0014 vom 2024-07-23",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4828 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4828"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4829 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4829"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4826 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4826"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4874 vom 2024-07-26",
"url": "https://access.redhat.com/errata/RHSA-2024:4874"
},
{
"category": "external",
"summary": "Cisco Security Bulletin",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4911 vom 2024-07-30",
"url": "https://access.redhat.com/errata/RHSA-2024:4911"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4912 vom 2024-07-30",
"url": "https://access.redhat.com/errata/RHSA-2024:4912"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4913 vom 2024-07-30",
"url": "https://access.redhat.com/errata/RHSA-2024:4913"
},
{
"category": "external",
"summary": "HPE Security Advisory vom 2024-07-30",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04675en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4936 vom 2024-07-31",
"url": "https://linux.oracle.com/errata/ELSA-2024-4936.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4936 vom 2024-07-31",
"url": "https://access.redhat.com/errata/RHSA-2024:4936"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4935 vom 2024-08-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-4935.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4935 vom 2024-07-31",
"url": "https://access.redhat.com/errata/RHSA-2024:4935"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4935 vom 2024-08-01",
"url": "https://errata.build.resf.org/RLSA-2024:4935"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4936 vom 2024-08-01",
"url": "https://errata.build.resf.org/RLSA-2024:4936"
},
{
"category": "external",
"summary": "Micro Focus Security Bulletin KM00002914 vom 2024-08-06",
"url": "https://www.netiq.com/documentation/advanced-authentication-64/advanced-authentication-releasenotes-6432/data/advanced-authentication-releasenotes-6432.html"
},
{
"category": "external",
"summary": "Alcatel-Lucent Security Advisory SA-N0139 vom 2024-08-13",
"url": "https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-n0139_radius_protocol_vulnerability_ed01.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2611 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2611.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20240822-0001 vom 2024-08-22",
"url": "https://security.netapp.com/advisory/ntap-20240822-0001/"
},
{
"category": "external",
"summary": "Cambium Security Notification vom 2024-08-28",
"url": "https://www.cambiumnetworks.com/wp-content/uploads/Security-Notification-CVE-2024-3596.pdf"
},
{
"category": "external",
"summary": "F5 Security Advisory K000141008 vom 2024-09-09",
"url": "https://my.f5.com/manage/s/article/K000141008"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2024-2632 vom 2024-09-24",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25028"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4911 vom 2024-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-4911.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA88210 vom 2023-10-02",
"url": "https://supportportal.juniper.net/s/article/2024-09-30-Out-of-Cycle-Security-Advisory-Multiple-Products-RADIUS-protocol-susceptible-to-forgery-attacks-Blast-RADIUS-CVE-2024-3596"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7055-1 vom 2024-10-03",
"url": "https://ubuntu.com/security/notices/USN-7055-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8461 vom 2024-10-24",
"url": "https://access.redhat.com/errata/RHSA-2024:8461"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8577 vom 2024-10-29",
"url": "https://access.redhat.com/errata/RHSA-2024:8577"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-862F5C4156 vom 2024-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-862f5c4156"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C0961D31B8 vom 2024-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c0961d31b8"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-29A74AC2B0 vom 2024-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-29a74ac2b0"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8788 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8788"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8789 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8789"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8792 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8792"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8791 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8791"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8794 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8794"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8860 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8860"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8860 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8860.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9474 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9547 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9547"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9583 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9583"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9474 vom 2024-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2024-9474.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8788 vom 2024-12-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-8788.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178065 vom 2024-12-06",
"url": "https://www.ibm.com/support/pages/node/7178065"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11109 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11109"
},
{
"category": "external",
"summary": "FortiGuard Labs PSIRT Advisory FG-IR-24-255 vom 2025-01-14",
"url": "https://www.fortiguard.com/psirt/FG-IR-24-255"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10990 vom 2025-01-15",
"url": "https://access.redhat.com/errata/RHSA-2024:10990"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7257-1 vom 2025-02-05",
"url": "https://ubuntu.com/security/notices/USN-7257-1"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-794185 vom 2025-05-13",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBUX04931 vom 2025-08-25",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04931en_us\u0026docLocale=en_US"
}
],
"source_lang": "en-US",
"title": "RADIUS: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-08-25T22:00:00.000+00:00",
"generator": {
"date": "2025-08-26T06:35:37.085+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1578",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Palo Alto Networks aufgenommen"
},
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-07-21T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Cisco"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SonicWall aufgenommen"
},
{
"date": "2024-07-24T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-25T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux, Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Micro Focus aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Alcatel-Lucent aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-09-09T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und Juniper aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-24T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-29T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Fortinet aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Siemens aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von HP aufgenommen"
}
],
"status": "final",
"version": "36"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Alcatel Lucent Enterprise OmniSwitch",
"product": {
"name": "Alcatel Lucent Enterprise OmniSwitch",
"product_id": "T017286",
"product_identification_helper": {
"cpe": "cpe:/h:alcatel-lucent:omniswitch:-"
}
}
}
],
"category": "vendor",
"name": "Alcatel Lucent Enterprise"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Arista EOS",
"product": {
"name": "Arista EOS",
"product_id": "T007958",
"product_identification_helper": {
"cpe": "cpe:/o:arista:arista_eos:-"
}
}
},
{
"category": "product_name",
"name": "Arista WiFi Access Point",
"product": {
"name": "Arista WiFi Access Point",
"product_id": "T019358",
"product_identification_helper": {
"cpe": "cpe:/h:arista:wifi_access_point:-"
}
}
}
],
"category": "vendor",
"name": "Arista"
},
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T021926",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Aruba ClearPass Policy Manager",
"product": {
"name": "Aruba ClearPass Policy Manager",
"product_id": "T023403",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.12.2",
"product": {
"name": "Aruba ClearPass Policy Manager \u003c6.12.2",
"product_id": "T036501"
}
},
{
"category": "product_version",
"name": "6.12.2",
"product": {
"name": "Aruba ClearPass Policy Manager 6.12.2",
"product_id": "T036501-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.12.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.11.9",
"product": {
"name": "Aruba ClearPass Policy Manager \u003c6.11.9",
"product_id": "T036502"
}
},
{
"category": "product_version",
"name": "6.11.9",
"product": {
"name": "Aruba ClearPass Policy Manager 6.11.9",
"product_id": "T036502-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.11.9"
}
}
}
],
"category": "product_name",
"name": "ClearPass Policy Manager"
},
{
"category": "product_name",
"name": "Aruba EdgeConnect",
"product": {
"name": "Aruba EdgeConnect",
"product_id": "T027755",
"product_identification_helper": {
"cpe": "cpe:/a:aruba:edgeconnect:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T022212",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
},
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "product_name",
"name": "Brocade SANnav"
},
{
"category": "product_name",
"name": "Broadcom Fabric OS",
"product": {
"name": "Broadcom Fabric OS",
"product_id": "978054",
"product_identification_helper": {
"cpe": "cpe:/o:broadcom:fabric_operating_system:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Cambium Networks cnPilot",
"product": {
"name": "Cambium Networks cnPilot",
"product_id": "T037142",
"product_identification_helper": {
"cpe": "cpe:/h:cambiumnetworks:cnpilot:-"
}
}
}
],
"category": "vendor",
"name": "Cambium Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco ASA (Adaptive Security Appliance)",
"product": {
"name": "Cisco ASA (Adaptive Security Appliance)",
"product_id": "T035033",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:adaptive_security_appliance:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Application Policy Infrastructure Controller",
"product": {
"name": "Cisco Application Policy Infrastructure Controller",
"product_id": "778219",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:application_policy_infrastructure_controller:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Catalyst SD-WAN Manager",
"product": {
"name": "Cisco Catalyst SD-WAN Manager",
"product_id": "1487015",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:catalyst_sd-wan_manager:20.11.1.2"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Management Center",
"product": {
"name": "Cisco Firepower Management Center",
"product_id": "T016458",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:management_center"
}
}
},
{
"category": "product_version",
"name": "Device Manager",
"product": {
"name": "Cisco Firepower Device Manager",
"product_id": "T016459",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:device_manager"
}
}
},
{
"category": "product_version",
"name": "Threat Defense",
"product": {
"name": "Cisco Firepower Threat Defense",
"product_id": "T029736",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:threat_defense"
}
}
}
],
"category": "product_name",
"name": "Firepower"
},
{
"category": "product_name",
"name": "Cisco IOS",
"product": {
"name": "Cisco IOS",
"product_id": "T034297",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IOS XE",
"product": {
"name": "Cisco IOS XE",
"product_id": "T030538",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios_xe:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IOS XR",
"product": {
"name": "Cisco IOS XR",
"product_id": "2062",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios_xr:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Identity Services Engine (ISE)",
"product": {
"name": "Cisco Identity Services Engine (ISE)",
"product_id": "T000612",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:identity_services_engine_software:-"
}
}
},
{
"category": "product_name",
"name": "Cisco MDS 9000",
"product": {
"name": "Cisco MDS 9000",
"product_id": "T001069",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:mds_9000:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "3000",
"product": {
"name": "Cisco Nexus 3000",
"product_id": "T003851",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:3000"
}
}
},
{
"category": "product_version",
"name": "9000",
"product": {
"name": "Cisco Nexus 9000",
"product_id": "T003853",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:9000"
}
}
},
{
"category": "product_version",
"name": "7000",
"product": {
"name": "Cisco Nexus 7000",
"product_id": "T009516",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:7000"
}
}
}
],
"category": "product_name",
"name": "Nexus"
},
{
"category": "product_name",
"name": "Cisco Nexus Dashboard",
"product": {
"name": "Cisco Nexus Dashboard",
"product_id": "1202977",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:nexus_dashboard:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Prime Infrastructure",
"product": {
"name": "Cisco Prime Infrastructure",
"product_id": "T000756",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:prime_infrastructure:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Router",
"product": {
"name": "Cisco Router",
"product_id": "T003258",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:-"
}
}
},
{
"category": "product_version",
"name": "ASR 5000",
"product": {
"name": "Cisco Router ASR 5000",
"product_id": "T007902",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:asr_5000"
}
}
}
],
"category": "product_name",
"name": "Router"
},
{
"category": "product_name",
"name": "Cisco SD-WAN",
"product": {
"name": "Cisco SD-WAN",
"product_id": "T015770",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:sd_wan:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Secure Email Gateway",
"product": {
"name": "Cisco Secure Email Gateway",
"product_id": "1269011",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:secure_email_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Secure Web Appliance",
"product": {
"name": "Cisco Secure Web Appliance",
"product_id": "T034850",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:secure_web_appliance:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Central Software",
"product": {
"name": "Cisco Unified Computing System (UCS) Central Software",
"product_id": "T021359",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:central_software"
}
}
},
{
"category": "product_version",
"name": "Manager",
"product": {
"name": "Cisco Unified Computing System (UCS) Manager",
"product_id": "T036384",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:manager"
}
}
}
],
"category": "product_name",
"name": "Unified Computing System (UCS)"
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2.0",
"product": {
"name": "Fortinet FortiAuthenticator \u003c6.2.0",
"product_id": "1002222"
}
},
{
"category": "product_version",
"name": "6.2.0",
"product": {
"name": "Fortinet FortiAuthenticator 6.2.0",
"product_id": "1002222-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fortinet:fortiauthenticator:6.2.0"
}
}
}
],
"category": "product_name",
"name": "FortiAuthenticator"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.4.0",
"product": {
"name": "Fortinet FortiOS \u003c7.4.0",
"product_id": "1497663"
}
},
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Fortinet FortiOS 7.4.0",
"product_id": "1497663-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:fortinet:fortios:7.4.0"
}
}
}
],
"category": "product_name",
"name": "FortiOS"
}
],
"category": "vendor",
"name": "Fortinet"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11i v3",
"product": {
"name": "HPE HP-UX 11i v3",
"product_id": "T046489",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:11i_v3"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM MQ",
"product": {
"name": "IBM MQ",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c21.4R3-S9",
"product": {
"name": "Juniper JUNOS \u003c21.4R3-S9",
"product_id": "T037890"
}
},
{
"category": "product_version",
"name": "21.4R3-S9",
"product": {
"name": "Juniper JUNOS 21.4R3-S9",
"product_id": "T037890-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:21.4r3-s9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.2R3-S5",
"product": {
"name": "Juniper JUNOS \u003c22.2R3-S5",
"product_id": "T037891"
}
},
{
"category": "product_version",
"name": "22.2R3-S5",
"product": {
"name": "Juniper JUNOS 22.2R3-S5",
"product_id": "T037891-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.2r3-s5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.4R3-S5",
"product": {
"name": "Juniper JUNOS \u003c22.4R3-S5",
"product_id": "T037892"
}
},
{
"category": "product_version",
"name": "22.4R3-S5",
"product": {
"name": "Juniper JUNOS 22.4R3-S5",
"product_id": "T037892-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.4r3-s5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.2R2-S3",
"product": {
"name": "Juniper JUNOS \u003c23.2R2-S3",
"product_id": "T037893"
}
},
{
"category": "product_version",
"name": "23.2R2-S3",
"product": {
"name": "Juniper JUNOS 23.2R2-S3",
"product_id": "T037893-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.2r2-s3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.4R2-S3",
"product": {
"name": "Juniper JUNOS \u003c23.4R2-S3",
"product_id": "T037894"
}
},
{
"category": "product_version",
"name": "23.4R2-S3",
"product": {
"name": "Juniper JUNOS 23.4R2-S3",
"product_id": "T037894-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.4r2-s3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.2R2",
"product": {
"name": "Juniper JUNOS \u003c24.2R2",
"product_id": "T037895"
}
},
{
"category": "product_version",
"name": "24.2R2",
"product": {
"name": "Juniper JUNOS 24.2R2",
"product_id": "T037895-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:24.2r2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c21.4R3-S9-EVO",
"product": {
"name": "Juniper JUNOS \u003c21.4R3-S9-EVO",
"product_id": "T037899"
}
},
{
"category": "product_version",
"name": "21.4R3-S9-EVO",
"product": {
"name": "Juniper JUNOS 21.4R3-S9-EVO",
"product_id": "T037899-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:21.4r3-s9-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.2R3-S5-EVO",
"product": {
"name": "Juniper JUNOS \u003c22.2R3-S5-EVO",
"product_id": "T037900"
}
},
{
"category": "product_version",
"name": "22.2R3-S5-EVO",
"product": {
"name": "Juniper JUNOS 22.2R3-S5-EVO",
"product_id": "T037900-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.2r3-s5-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.3R3-S4-EVO",
"product": {
"name": "Juniper JUNOS \u003c22.3R3-S4-EVO",
"product_id": "T037901"
}
},
{
"category": "product_version",
"name": "22.3R3-S4-EVO",
"product": {
"name": "Juniper JUNOS 22.3R3-S4-EVO",
"product_id": "T037901-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.3r3-s4-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.4R3-S5-EVO",
"product": {
"name": "Juniper JUNOS \u003c22.4R3-S5-EVO",
"product_id": "T037902"
}
},
{
"category": "product_version",
"name": "22.4R3-S5-EVO",
"product": {
"name": "Juniper JUNOS 22.4R3-S5-EVO",
"product_id": "T037902-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:22.4r3-s5-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.2R2-S3-EVO",
"product": {
"name": "Juniper JUNOS \u003c23.2R2-S3-EVO",
"product_id": "T037903"
}
},
{
"category": "product_version",
"name": "23.2R2-S3-EVO",
"product": {
"name": "Juniper JUNOS 23.2R2-S3-EVO",
"product_id": "T037903-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.2r2-s3-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c23.4R2-S3-EVO",
"product": {
"name": "Juniper JUNOS \u003c23.4R2-S3-EVO",
"product_id": "T037904"
}
},
{
"category": "product_version",
"name": "23.4R2-S3-EVO",
"product": {
"name": "Juniper JUNOS 23.4R2-S3-EVO",
"product_id": "T037904-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:23.4r2-s3-evo"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.2R2-EVO",
"product": {
"name": "Juniper JUNOS \u003c24.2R2-EVO",
"product_id": "T037905"
}
},
{
"category": "product_version",
"name": "24.2R2-EVO",
"product": {
"name": "Juniper JUNOS 24.2R2-EVO",
"product_id": "T037905-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:24.2r2-evo"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "LANCOM Access Point",
"product": {
"name": "LANCOM Access Point",
"product_id": "T035952",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:access_point:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.50 RU14",
"product": {
"name": "LANCOM LCOS \u003c10.50 RU14",
"product_id": "T035940"
}
},
{
"category": "product_version",
"name": "10.50 RU14",
"product": {
"name": "LANCOM LCOS 10.50 RU14",
"product_id": "T035940-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:10.50_ru14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.72 RU8",
"product": {
"name": "LANCOM LCOS \u003c10.72 RU8",
"product_id": "T035941"
}
},
{
"category": "product_version",
"name": "10.72 RU8",
"product": {
"name": "LANCOM LCOS 10.72 RU8",
"product_id": "T035941-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:10.72_ru8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.80 RU6",
"product": {
"name": "LANCOM LCOS \u003c10.80 RU6",
"product_id": "T035942"
}
},
{
"category": "product_version",
"name": "10.80 RU6",
"product": {
"name": "LANCOM LCOS 10.80 RU6",
"product_id": "T035942-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:10.80_ru6"
}
}
},
{
"category": "product_version_range",
"name": "LX \u003c6.20",
"product": {
"name": "LANCOM LCOS LX \u003c6.20",
"product_id": "T035945"
}
},
{
"category": "product_version",
"name": "LX 6.20",
"product": {
"name": "LANCOM LCOS LX 6.20",
"product_id": "T035945-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:6.20::lx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c3.34 SU8",
"product": {
"name": "LANCOM LCOS SX \u003c3.34 SU8",
"product_id": "T035947"
}
},
{
"category": "product_version",
"name": "SX 3.34 SU8",
"product": {
"name": "LANCOM LCOS SX 3.34 SU8",
"product_id": "T035947-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:3.34:su8:sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c4.00 SU13",
"product": {
"name": "LANCOM LCOS SX \u003c4.00 SU13",
"product_id": "T035948"
}
},
{
"category": "product_version",
"name": "SX 4.00 SU13",
"product": {
"name": "LANCOM LCOS SX 4.00 SU13",
"product_id": "T035948-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:4.00:su13:sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c4.20 SU3",
"product": {
"name": "LANCOM LCOS SX \u003c4.20 SU3",
"product_id": "T035949"
}
},
{
"category": "product_version",
"name": "SX 4.20 SU3",
"product": {
"name": "LANCOM LCOS SX 4.20 SU3",
"product_id": "T035949-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:4.20:su3:sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c4.30",
"product": {
"name": "LANCOM LCOS SX \u003c4.30",
"product_id": "T035950"
}
},
{
"category": "product_version",
"name": "SX 4.30",
"product": {
"name": "LANCOM LCOS SX 4.30",
"product_id": "T035950-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:4.30::sx"
}
}
},
{
"category": "product_version_range",
"name": "SX \u003c5.20 SU9",
"product": {
"name": "LANCOM LCOS SX \u003c5.20 SU9",
"product_id": "T035951"
}
},
{
"category": "product_version",
"name": "SX 5.20 SU9",
"product": {
"name": "LANCOM LCOS SX 5.20 SU9",
"product_id": "T035951-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:lancom:lcos:5.20:su9:sx"
}
}
}
],
"category": "product_name",
"name": "LCOS"
},
{
"category": "product_name",
"name": "LANCOM Router",
"product": {
"name": "LANCOM Router",
"product_id": "T019305",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:router:-"
}
}
},
{
"category": "product_name",
"name": "LANCOM Switch",
"product": {
"name": "LANCOM Switch",
"product_id": "T035953",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:switch:-"
}
}
}
],
"category": "vendor",
"name": "LANCOM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.4 Service Pack 3 Patch 2",
"product": {
"name": "Micro Focus NetIQ Advanced Authentication \u003c6.4 Service Pack 3 Patch 2",
"product_id": "T036618"
}
},
{
"category": "product_version",
"name": "6.4 Service Pack 3 Patch 2",
"product": {
"name": "Micro Focus NetIQ Advanced Authentication 6.4 Service Pack 3 Patch 2",
"product_id": "T036618-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microfocus:netiq_advanced_authentication:6.4_service_pack_3_patch_2"
}
}
}
],
"category": "product_name",
"name": "NetIQ Advanced Authentication"
}
],
"category": "vendor",
"name": "Micro Focus"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.0.27",
"product": {
"name": "Open Source FreeRADIUS \u003c3.0.27",
"product_id": "T035938"
}
},
{
"category": "product_version",
"name": "3.0.27",
"product": {
"name": "Open Source FreeRADIUS 3.0.27",
"product_id": "T035938-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:freeradius:freeradius:3.0.27"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.2.5",
"product": {
"name": "Open Source FreeRADIUS \u003c3.2.5",
"product_id": "T035939"
}
},
{
"category": "product_version",
"name": "3.2.5",
"product": {
"name": "Open Source FreeRADIUS 3.2.5",
"product_id": "T035939-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:freeradius:freeradius:3.2.5"
}
}
}
],
"category": "product_name",
"name": "FreeRADIUS"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.2",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c11.2",
"product_id": "T036074"
}
},
{
"category": "product_version",
"name": "11.2",
"product": {
"name": "Palo Alto Networks PAN-OS 11.2",
"product_id": "T036074-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:11.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.1.3",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c11.1.3",
"product_id": "T036075"
}
},
{
"category": "product_version",
"name": "11.1.3",
"product": {
"name": "Palo Alto Networks PAN-OS 11.1.3",
"product_id": "T036075-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:11.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.4-h4",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c11.0.4-h4",
"product_id": "T036076"
}
},
{
"category": "product_version",
"name": "11.0.4-h4",
"product": {
"name": "Palo Alto Networks PAN-OS 11.0.4-h4",
"product_id": "T036076-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:11.0.4-h4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.2.10",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c10.2.10",
"product_id": "T036077"
}
},
{
"category": "product_version",
"name": "10.2.10",
"product": {
"name": "Palo Alto Networks PAN-OS 10.2.10",
"product_id": "T036077-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.10"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.14",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c10.1.14",
"product_id": "T036078"
}
},
{
"category": "product_version",
"name": "10.1.14",
"product": {
"name": "Palo Alto Networks PAN-OS 10.1.14",
"product_id": "T036078-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:10.1.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.19",
"product": {
"name": "Palo Alto Networks PAN-OS \u003c9.1.19",
"product_id": "T036079"
}
},
{
"category": "product_version",
"name": "9.1.19",
"product": {
"name": "Palo Alto Networks PAN-OS 9.1.19",
"product_id": "T036079-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:9.1.19"
}
}
}
],
"category": "product_name",
"name": "PAN-OS"
}
],
"category": "vendor",
"name": "Palo Alto Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "Logging \u003c5.9.10",
"product": {
"name": "Red Hat OpenShift Logging \u003c5.9.10",
"product_id": "T040352"
}
},
{
"category": "product_version",
"name": "Logging 5.9.10",
"product": {
"name": "Red Hat OpenShift Logging 5.9.10",
"product_id": "T040352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging__5.9.10"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "GridPass \u003c2.50",
"product": {
"name": "Siemens SICAM GridPass \u003c2.50",
"product_id": "T043580"
}
},
{
"category": "product_version",
"name": "GridPass 2.50",
"product": {
"name": "Siemens SICAM GridPass 2.50",
"product_id": "T043580-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:sicam:gridpass__2.50"
}
}
}
],
"category": "product_name",
"name": "SICAM"
},
{
"branches": [
{
"category": "product_version",
"name": "5",
"product": {
"name": "Siemens SIPROTEC 5",
"product_id": "T025552",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:siprotec:5"
}
}
}
],
"category": "product_name",
"name": "SIPROTEC"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "SonicWall Global VPN Client",
"product": {
"name": "SonicWall Global VPN Client",
"product_id": "829390",
"product_identification_helper": {
"cpe": "cpe:/a:sonicwall:global_vpn_client:-"
}
}
}
],
"category": "vendor",
"name": "SonicWall"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"product_status": {
"known_affected": [
"T036502",
"T016459",
"T016458",
"T021926",
"1202977",
"T007902",
"T036501",
"T004914",
"T036384",
"T000756",
"T027755",
"T029736",
"398363",
"T035942",
"T035941",
"T035948",
"T003851",
"T035947",
"T003258",
"T009516",
"T003853",
"T035945",
"T034297",
"T036076",
"T035940",
"T034850",
"T036077",
"T017286",
"T036078",
"T036079",
"T036074",
"T036075",
"T002207",
"T019305",
"T023403",
"T035939",
"T035938",
"829390",
"T035953",
"T035952",
"1002222",
"T037899",
"67646",
"T037895",
"T035033",
"T036688",
"T037891",
"T035951",
"T037892",
"T035950",
"1487015",
"T037893",
"T037894",
"978054",
"T019358",
"T037890",
"T000612",
"T021359",
"T030538",
"1497663",
"T001069",
"T001663",
"T043580",
"1269011",
"T035949",
"T025552",
"T040352",
"T037903",
"T037904",
"T036618",
"T037905",
"T037900",
"T037901",
"T037902",
"T007958",
"2062",
"T032255",
"74185",
"T015770",
"T037142",
"T034392",
"T000126",
"778219",
"T022212",
"T046489"
]
},
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
}
]
}
suse-su-2024:2366-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeradius-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeradius-server fixes the following issues:\n\n- CVE-2024-3596: Fixed chosen-prefix collision attack against MD5 (bsc#1223414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2366,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2366,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2366,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2366,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2366,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2366,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2366,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2366,openSUSE-SLE-15.5-2024-2366",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2366-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2366-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242366-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2366-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035871.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223414",
"url": "https://bugzilla.suse.com/1223414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3596/"
}
],
"title": "Security update for freeradius-server",
"tracking": {
"current_release_date": "2024-07-09T14:04:22Z",
"generator": {
"date": "2024-07-09T14:04:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2366-1",
"initial_release_date": "2024-07-09T14:04:22Z",
"revision_history": [
{
"date": "2024-07-09T14:04:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-doc-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"product": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"product_id": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-devel-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-doc-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-krb5-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-ldap-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-libs-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-mysql-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-perl-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-postgresql-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-python3-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-sqlite-3.0.25-150400.4.7.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.i586",
"product": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.i586",
"product_id": "freeradius-server-utils-3.0.25-150400.4.7.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"product": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"product_id": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-doc-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"product": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"product_id": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-doc-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"product": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"product_id": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-doc-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-doc-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-doc-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3596"
}
],
"notes": [
{
"category": "general",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3596",
"url": "https://www.suse.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "SUSE Bug 1223414 for CVE-2024-3596",
"url": "https://bugzilla.suse.com/1223414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Proxy 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"SUSE Manager Server 4.3:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-devel-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-doc-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-krb5-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-ldap-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-ldap-schemas-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-libs-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-mysql-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-perl-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-postgresql-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-python3-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-sqlite-3.0.25-150400.4.7.1.x86_64",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.aarch64",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.ppc64le",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.s390x",
"openSUSE Leap 15.5:freeradius-server-utils-3.0.25-150400.4.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:04:22Z",
"details": "important"
}
],
"title": "CVE-2024-3596"
}
]
}
suse-su-2024:2367-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeradius-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeradius-server fixes the following issues:\n\n- CVE-2024-3596: Fixed chosen-prefix collision attack against MD5 (bsc#1223414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2367,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2367,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2367,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2367,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2367,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2367,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2367,SUSE-Storage-7.1-2024-2367",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2367-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2367-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242367-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2367-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035870.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223414",
"url": "https://bugzilla.suse.com/1223414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3596/"
}
],
"title": "Security update for freeradius-server",
"tracking": {
"current_release_date": "2024-07-09T14:05:14Z",
"generator": {
"date": "2024-07-09T14:05:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2367-1",
"initial_release_date": "2024-07-09T14:05:14Z",
"revision_history": [
{
"date": "2024-07-09T14:05:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-doc-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"product": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"product_id": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-devel-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-doc-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-krb5-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-ldap-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-libs-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-mysql-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-perl-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-postgresql-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-python3-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-sqlite-3.0.21-150200.3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.i586",
"product": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.i586",
"product_id": "freeradius-server-utils-3.0.21-150200.3.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-doc-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"product": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"product_id": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-doc-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"product": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"product_id": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-doc-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-doc-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"product": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"product_id": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3596"
}
],
"notes": [
{
"category": "general",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3596",
"url": "https://www.suse.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "SUSE Bug 1223414 for CVE-2024-3596",
"url": "https://bugzilla.suse.com/1223414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Enterprise Storage 7.1:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-devel-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-krb5-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-ldap-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-libs-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-mysql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-perl-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-postgresql-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-python3-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-sqlite-3.0.21-150200.3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:freeradius-server-utils-3.0.21-150200.3.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:05:14Z",
"details": "important"
}
],
"title": "CVE-2024-3596"
}
]
}
suse-su-2024:2359-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeradius-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeradius-server fixes the following issues:\n\n- CVE-2024-3596: Fixed chosen-prefix collision attack against MD5 (bsc#1223414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2359,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2359,openSUSE-SLE-15.6-2024-2359",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2359-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2359-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242359-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2359-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035875.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223414",
"url": "https://bugzilla.suse.com/1223414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3596/"
}
],
"title": "Security update for freeradius-server",
"tracking": {
"current_release_date": "2024-07-09T14:00:47Z",
"generator": {
"date": "2024-07-09T14:00:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2359-1",
"initial_release_date": "2024-07-09T14:00:47Z",
"revision_history": [
{
"date": "2024-07-09T14:00:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-doc-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"product": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"product_id": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-devel-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-doc-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-krb5-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-ldap-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-libs-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-mysql-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-perl-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-postgresql-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-python3-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-sqlite-3.2.4-150600.3.3.2.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.i586",
"product": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.i586",
"product_id": "freeradius-server-utils-3.2.4-150600.3.3.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"product": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"product_id": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-doc-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"product": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"product_id": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-doc-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"product": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"product_id": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-doc-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-doc-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-doc-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64"
},
"product_reference": "freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3596"
}
],
"notes": [
{
"category": "general",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3596",
"url": "https://www.suse.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "SUSE Bug 1223414 for CVE-2024-3596",
"url": "https://bugzilla.suse.com/1223414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-devel-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-doc-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-krb5-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-ldap-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-ldap-schemas-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-libs-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-mysql-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-perl-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-postgresql-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-python3-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-sqlite-3.2.4-150600.3.3.2.x86_64",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.aarch64",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.ppc64le",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.s390x",
"openSUSE Leap 15.6:freeradius-server-utils-3.2.4-150600.3.3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:00:47Z",
"details": "important"
}
],
"title": "CVE-2024-3596"
}
]
}
suse-su-2024:2361-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for freeradius-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for freeradius-server fixes the following issues:\n\n- CVE-2024-3596: Fixed chosen-prefix collision attack against MD5 (bsc#1223414).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2361,SUSE-SLE-SDK-12-SP5-2024-2361,SUSE-SLE-SERVER-12-SP5-2024-2361",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2361-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2361-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242361-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2361-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035873.html"
},
{
"category": "self",
"summary": "SUSE Bug 1223414",
"url": "https://bugzilla.suse.com/1223414"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3596/"
}
],
"title": "Security update for freeradius-server",
"tracking": {
"current_release_date": "2024-07-09T14:01:15Z",
"generator": {
"date": "2024-07-09T14:01:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2361-1",
"initial_release_date": "2024-07-09T14:01:15Z",
"revision_history": [
{
"date": "2024-07-09T14:01:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-devel-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-devel-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-doc-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-doc-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-krb5-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-ldap-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-libs-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-libs-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-mysql-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-perl-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-perl-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-python-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-python-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.19-3.15.1.aarch64",
"product": {
"name": "freeradius-server-utils-3.0.19-3.15.1.aarch64",
"product_id": "freeradius-server-utils-3.0.19-3.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-devel-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-devel-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-doc-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-doc-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-krb5-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-ldap-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-libs-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-libs-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-mysql-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-perl-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-perl-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-postgresql-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-python-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-python-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-python-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-sqlite-3.0.19-3.15.1.i586"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.19-3.15.1.i586",
"product": {
"name": "freeradius-server-utils-3.0.19-3.15.1.i586",
"product_id": "freeradius-server-utils-3.0.19-3.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-devel-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-devel-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-doc-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-libs-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-perl-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-python-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-python-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-python-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"product": {
"name": "freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"product_id": "freeradius-server-utils-3.0.19-3.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-devel-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-devel-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-doc-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-doc-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-krb5-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-ldap-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-libs-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-libs-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-mysql-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-perl-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-perl-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-postgresql-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-python-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-python-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-python-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-sqlite-3.0.19-3.15.1.s390"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.19-3.15.1.s390",
"product": {
"name": "freeradius-server-utils-3.0.19-3.15.1.s390",
"product_id": "freeradius-server-utils-3.0.19-3.15.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-devel-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-devel-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-doc-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-doc-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-krb5-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-ldap-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-libs-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-libs-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-mysql-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-perl-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-perl-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-postgresql-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-python-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-python-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-python-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-sqlite-3.0.19-3.15.1.s390x"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.19-3.15.1.s390x",
"product": {
"name": "freeradius-server-utils-3.0.19-3.15.1.s390x",
"product_id": "freeradius-server-utils-3.0.19-3.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freeradius-server-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-devel-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-devel-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-devel-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-doc-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-doc-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-doc-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-krb5-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-ldap-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-libs-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-libs-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-libs-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-mysql-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-perl-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-perl-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-perl-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-python-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-python-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-python-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "freeradius-server-utils-3.0.19-3.15.1.x86_64",
"product": {
"name": "freeradius-server-utils-3.0.19-3.15.1.x86_64",
"product_id": "freeradius-server-utils-3.0.19-3.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-devel-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-devel-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-devel-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-devel-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-devel-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-doc-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-doc-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-krb5-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-ldap-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-libs-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-libs-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-mysql-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-perl-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-perl-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-python-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-python-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freeradius-server-utils-3.0.19-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64"
},
"product_reference": "freeradius-server-utils-3.0.19-3.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3596"
}
],
"notes": [
{
"category": "general",
"text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3596",
"url": "https://www.suse.com/security/cve/CVE-2024-3596"
},
{
"category": "external",
"summary": "SUSE Bug 1223414 for CVE-2024-3596",
"url": "https://bugzilla.suse.com/1223414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-doc-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-krb5-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-ldap-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-libs-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-mysql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-perl-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-postgresql-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-python-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-sqlite-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:freeradius-server-utils-3.0.19-3.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:freeradius-server-devel-3.0.19-3.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:15Z",
"details": "important"
}
],
"title": "CVE-2024-3596"
}
]
}
fkie_cve-2024-3596
Vulnerability from fkie_nvd
9.0 (Critical) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | http://www.openwall.com/lists/oss-security/2024/07/09/4 | Mailing List | |
| cret@cert.org | https://cert-portal.siemens.com/productcert/html/ssa-723487.html | ||
| cret@cert.org | https://cert-portal.siemens.com/productcert/html/ssa-794185.html | ||
| cret@cert.org | https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/ | Technical Description | |
| cret@cert.org | https://datatracker.ietf.org/doc/html/rfc2865 | Technical Description | |
| cret@cert.org | https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf | Third Party Advisory | |
| cret@cert.org | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014 | Third Party Advisory | |
| cret@cert.org | https://www.blastradius.fail/ | Technical Description | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/07/09/4 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/ | Technical Description | |
| af854a3a-2127-422b-91ae-364da2661108 | https://datatracker.ietf.org/doc/html/rfc2865 | Technical Description | |
| af854a3a-2127-422b-91ae-364da2661108 | https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240822-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.blastradius.fail/ | Technical Description | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/456537 |
| Vendor | Product | Version | |
|---|---|---|---|
| freeradius | freeradius | * | |
| broadcom | brocade_sannav | - | |
| broadcom | fabric_operating_system | - | |
| sonicwall | sonicos | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C73FF4C-13DE-4050-BD56-447F9382AA4D",
"versionEndExcluding": "3.0.27",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75B1EDA5-F189-440D-AD0E-C70DD2C0FEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "046FB51E-B768-44D3-AEB5-D857145CA840",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF61DAA-8295-4407-B125-1714E1565965",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature."
},
{
"lang": "es",
"value": "El protocolo RADIUS seg\u00fan RFC 2865 es susceptible a ataques de falsificaci\u00f3n por parte de un atacante local que puede modificar cualquier respuesta v\u00e1lida (acceso-aceptaci\u00f3n, acceso-rechazo o acceso-desaf\u00edo) a cualquier otra respuesta utilizando un ataque de colisi\u00f3n de prefijo elegido contra la firma del autenticador de respuesta MD5. ."
}
],
"id": "CVE-2024-3596",
"lastModified": "2025-11-04T18:16:31.367",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-07-09T12:15:20.700",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/4"
},
{
"source": "cret@cert.org",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"source": "cret@cert.org",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"source": "cret@cert.org",
"tags": [
"Technical Description"
],
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"source": "cret@cert.org",
"tags": [
"Technical Description"
],
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
],
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"source": "cret@cert.org",
"tags": [
"Technical Description"
],
"url": "https://www.blastradius.fail/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20240822-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "https://www.blastradius.fail/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/456537"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-354"
},
{
"lang": "en",
"value": "CWE-924"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-3g8x-wqfp-q876
Vulnerability from github
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
{
"affected": [],
"aliases": [
"CVE-2024-3596"
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-354"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-09T12:15:20Z",
"severity": "CRITICAL"
},
"details": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.",
"id": "GHSA-3g8x-wqfp-q876",
"modified": "2025-11-04T18:31:07Z",
"published": "2024-07-09T12:30:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
},
{
"type": "WEB",
"url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius"
},
{
"type": "WEB",
"url": "https://datatracker.ietf.org/doc/html/rfc2865"
},
{
"type": "WEB",
"url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
},
{
"type": "WEB",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240822-0001"
},
{
"type": "WEB",
"url": "https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol"
},
{
"type": "WEB",
"url": "https://www.blastradius.fail"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/456537"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2024-3596
Vulnerability from gsd
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-3596"
],
"id": "GSD-2024-3596",
"modified": "2024-04-11T05:03:27.122669Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-3596",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.